Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-3711 (GCVE-0-2021-3711)
Vulnerability from cvelistv5
- Buffer overflow
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:01:08.171Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "tags": [ "x_transferred" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "name": "DSA-4963", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4963" }, { "name": "[tomcat-dev] 20210825 OpenSSL security announcement - do we need a Tomcat Native release?", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[oss-security] 20210825 OpenSSL SM2 Decryption Buffer Overflow (CVE-2021-3711), Read buffer overruns processing ASN.1 strings (CVE-2021-3712)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "name": "[tomcat-dev] 20210826 Re: OpenSSL security announcement - do we need a Tomcat Native release?", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "tags": [ "x_transferred" ], "url": "https://www.tenable.com/security/tns-2021-16" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "tags": [ "x_transferred" ], "url": "https://www.tenable.com/security/tns-2022-02" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "name": "GLSA-202209-02", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202209-02" }, { "name": "GLSA-202210-02", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202210-02" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenSSL", "vendor": "OpenSSL", "versions": [ { "status": "affected", "version": "Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k)" } ] } ], "credits": [ { "lang": "en", "value": "John Ouyang" } ], "datePublic": "2021-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k)." } ], "metrics": [ { "other": { "content": { "lang": "eng", "url": "https://www.openssl.org/policies/secpolicy.html#High", "value": "High" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-21T19:07:59.573968", "orgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5", "shortName": "openssl" }, "references": [ { "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "name": "DSA-4963", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2021/dsa-4963" }, { "name": "[tomcat-dev] 20210825 OpenSSL security announcement - do we need a Tomcat Native release?", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[oss-security] 20210825 OpenSSL SM2 Decryption Buffer Overflow (CVE-2021-3711), Read buffer overruns processing ASN.1 strings (CVE-2021-3712)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "name": "[tomcat-dev] 20210826 Re: OpenSSL security announcement - do we need a Tomcat Native release?", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E" }, { "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "url": "https://www.tenable.com/security/tns-2021-16" }, { "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "url": "https://www.tenable.com/security/tns-2022-02" }, { "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "name": "GLSA-202209-02", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202209-02" }, { "name": "GLSA-202210-02", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202210-02" }, { "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" } ], "title": "SM2 Decryption Buffer Overflow" } }, "cveMetadata": { "assignerOrgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5", "assignerShortName": "openssl", "cveId": "CVE-2021-3711", "datePublished": "2021-08-24T14:50:13.114745Z", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-09-16T18:29:03.742Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-3711\",\"sourceIdentifier\":\"openssl-security@openssl.org\",\"published\":\"2021-08-24T15:15:09.133\",\"lastModified\":\"2024-11-21T06:22:12.960\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \\\"out\\\" parameter can be NULL and, on exit, the \\\"outlen\\\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \\\"out\\\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).\"},{\"lang\":\"es\",\"value\":\"Para descifrar los datos cifrados de SM2 se espera que una aplicaci\u00f3n llame a la funci\u00f3n de la API EVP_PKEY_decrypt(). Normalmente, una aplicaci\u00f3n llamar\u00e1 a esta funci\u00f3n dos veces. La primera vez, al entrar, el par\u00e1metro \\\"out\\\" puede ser NULL y, al salir, el par\u00e1metro \\\"outlen\\\" se rellena con el tama\u00f1o del b\u00fafer necesario para contener el texto plano descifrado. La aplicaci\u00f3n puede entonces asignar un b\u00fafer de tama\u00f1o suficiente y llamar de nuevo a EVP_PKEY_decrypt(), pero esta vez pasando un valor no NULL para el par\u00e1metro \\\"out\\\". Un bug en la implementaci\u00f3n del c\u00f3digo de descifrado SM2 significa que el c\u00e1lculo del tama\u00f1o del b\u00fafer necesario para mantener el texto plano devuelto por la primera llamada a EVP_PKEY_decrypt() puede ser menor que el tama\u00f1o real requerido por la segunda llamada. Esto puede conllevar a un desbordamiento del b\u00fafer cuando la aplicaci\u00f3n llama a EVP_PKEY_decrypt() por segunda vez con un b\u00fafer demasiado peque\u00f1o. Un atacante malicioso que sea capaz de presentar el contenido de SM2 para su descifrado a una aplicaci\u00f3n podr\u00eda causar que los datos elegidos por el atacante desborden el b\u00fafer hasta un m\u00e1ximo de 62 bytes alterando el contenido de otros datos mantenidos despu\u00e9s del b\u00fafer, posiblemente cambiando el comportamiento de la aplicaci\u00f3n o causando el bloqueo de la misma. La ubicaci\u00f3n del b\u00fafer depende de la aplicaci\u00f3n, pero normalmente se asigna a la pila. Corregido en OpenSSL versi\u00f3n 1.1.1l (Afectada 1.1.1-1.1.1k).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.1.1\",\"versionEndExcluding\":\"1.1.1l\",\"matchCriteriaId\":\"A9592A08-7FF0-490F-B684-6EA8E49F36C7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"B55E8D50-99B4-47EC-86F9-699B67D473CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FE996B1-6951-4F85-AA58-B99A379D2163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62347994-1353-497C-9C4A-D5D8D95F67E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0\",\"versionEndIncluding\":\"11.50.2\",\"matchCriteriaId\":\"433D435D-13D0-4EAA-ACD9-DD88DA712D00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C19813-E823-456A-B1CE-EC0684CE1953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:manageability_software_development_kit:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D39DCAE7-494F-40B2-867F-6C6A077939DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5735E553-9731-4AAC-BCFF-989377F817B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"361B791A-D336-4431-8F68-8135BEFFAEA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDFB1169-41A0-4A86-8E4F-FDA9730B1E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:storage_encryption:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D82795C-F1ED-4D2C-B578-75B9EECBB99C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD4349FE-EEF8-489A-8ABF-5FCD55EC6DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6EAA723-2A23-4151-930B-86ACF9CC1C0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C416FD3-2E2F-4BBC-BD5F-F896825883F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_border_controller:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D886339E-EDB2-4879-BD54-1800E4CA9CAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_unified_session_manager:8.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB468FEE-A0F4-49A0-BBEE-10D0733C87D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_unified_session_manager:8.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC5C177E-0C77-48C9-847A-A9E5AA7DBC1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_communications_broker:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"348EEE70-E114-4720-AAAF-E77DE5C9A2D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_communications_broker:3.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DCDD73B-57B1-4580-B922-5662E3AC13B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_session_border_controller:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7015A8CB-8FA6-423E-8307-BD903244F517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_session_border_controller:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A4E206-56C7-4578-AC9C-088B0C8D9CFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:essbase:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"11.1.2.4.47\",\"matchCriteriaId\":\"C78A7E07-AB08-46C5-942D-B40BBE0C0D06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:essbase:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"21.1\",\"versionEndExcluding\":\"21.3\",\"matchCriteriaId\":\"F2A9C248-94B0-4F7B-AD9C-4BE55AA1E3F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:health_sciences_inform_publisher:6.2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F12453B-0E7B-46B9-ADEC-0AC5EDC41058\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:health_sciences_inform_publisher:6.3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D105A5B-0AA8-4782-B804-CB1384F85884\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.2.6.3\",\"matchCriteriaId\":\"BE34D4F7-5C18-4578-8D0A-722FDF931333\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B1CAD50-749F-4ADB-A046-BF3585677A58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.0.27\",\"matchCriteriaId\":\"AE23C7E1-F849-411D-850F-A504D4BA3414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.0.25\",\"matchCriteriaId\":\"88627B99-16DC-4878-A63A-A40F6FC1F477\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.7.0\",\"versionEndIncluding\":\"5.7.35\",\"matchCriteriaId\":\"E667933A-37EA-4BC2-9180-C3B4B7038866\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndIncluding\":\"8.0.26\",\"matchCriteriaId\":\"709E83B4-8C66-4255-870B-2F72B37BA8C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E1E416B-920B-49A0-9523-382898C2979D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8AF00C6-B97F-414D-A8DF-057E6BFD8597\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E503FB-6279-4D4A-91D8-E237ECF9D2B0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tenable:nessus_network_monitor:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.13.1\",\"matchCriteriaId\":\"5FD1ED11-84AA-47E6-AD00-E08D035AF53B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16.0\",\"versionEndIncluding\":\"5.19.1\",\"matchCriteriaId\":\"8D977244-DC29-4301-8D89-0BD01BC328B8\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2021/08/26/2\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://security.gentoo.org/glsa/202209-02\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202210-02\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210827-0010/\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20211022-0003/\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://www.debian.org/security/2021/dsa-4963\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openssl.org/news/secadv/20210824.txt\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2022.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2021.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2021-16\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2022-02\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/08/26/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202209-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202210-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210827-0010/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20211022-0003/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2021/dsa-4963\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openssl.org/news/secadv/20210824.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2021-16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2022-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
suse-su-2022:2134-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for SUSE Manager Client Tools", "title": "Title of the patch" }, { "category": "description", "text": "This update fixes the following issues:\n\ngolang-github-QubitProducts-exporter_exporter:\n\n- Adapted to build on Enterprise Linux.\n- Fix build for RedHat 7\n- Require Go \u003e= 1.14 also for CentOS\n- Add support for CentOS\n- Replace %{?systemd_requires} with %{?systemd_ordering}\n\ngolang-github-prometheus-alertmanager:\n\n- CVE-2022-21698: Denial of service using InstrumentHandlerCounter.\n * Update vendor tarball with prometheus/client_golang 1.11.1 (bsc#1196338, jsc#SLE-24077)\n- Update required Go version to 1.16\n- Update to version 0.23.0:\n * amtool: Detect version drift and warn users (#2672)\n * Add ability to skip TLS verification for amtool (#2663)\n * Fix empty isEqual in amtool. (#2668)\n * Fix main tests (#2670)\n * cli: add new template render command (#2538)\n * OpsGenie: refer to alert instead of incident (#2609)\n * Docs: target_match and source_match are DEPRECATED (#2665)\n * Fix test not waiting for cluster member to be ready\n- Added hardening to systemd service(s) (bsc#1181400)\n\ngolang-github-prometheus-node_exporter:\n\n- CVE-2022-21698: Denial of service using InstrumentHandlerCounter.\n * Update vendor tarball with prometheus/client_golang 1.11.1\n (bsc#1196338, jsc#SLE-24238, jsc#SLE-24239)\n- Update to 1.3.0\n * [CHANGE] Add path label to rapl collector #2146\n * [CHANGE] Exclude filesystems under /run/credentials #2157\n * [CHANGE] Add TCPTimeouts to netstat default filter #2189\n * [FEATURE] Add lnstat collector for metrics from /proc/net/stat/ #1771\n * [FEATURE] Add darwin powersupply collector #1777\n * [FEATURE] Add support for monitoring GPUs on Linux #1998\n * [FEATURE] Add Darwin thermal collector #2032\n * [FEATURE] Add os release collector #2094\n * [FEATURE] Add netdev.address-info collector #2105\n * [FEATURE] Add clocksource metrics to time collector #2197\n * [ENHANCEMENT] Support glob textfile collector directories #1985\n * [ENHANCEMENT] ethtool: Expose node_ethtool_info metric #2080\n * [ENHANCEMENT] Use include/exclude flags for ethtool filtering #2165\n * [ENHANCEMENT] Add flag to disable guest CPU metrics #2123\n * [ENHANCEMENT] Add DMI collector #2131\n * [ENHANCEMENT] Add threads metrics to processes collector #2164\n * [ENHANCMMENT] Reduce timer GC delays in the Linux filesystem collector #2169\n * [ENHANCMMENT] Add TCPTimeouts to netstat default filter #2189\n * [ENHANCMMENT] Use SysctlTimeval for boottime collector on BSD #2208\n * [BUGFIX] ethtool: Sanitize metric names #2093\n * [BUGFIX] Fix ethtool collector for multiple interfaces #2126\n * [BUGFIX] Fix possible panic on macOS #2133\n * [BUGFIX] Collect flag_info and bug_info only for one core #2156\n * [BUGFIX] Prevent duplicate ethtool metric names #2187\n- Update to 1.2.2\n * Bug fixes\n Fix processes collector long int parsing #2112\n- Update to 1.2.1\n * Removed\n Remove obsolete capture permission denied error patch that is already included upstream\n Fix zoneinfo parsing prometheus/procfs#386\n Fix nvme collector log noise #2091\n Fix rapl collector log noise #2092\n- Update to 1.2.0\n * Changes\n Rename filesystem collector flags to match other collectors #2012\n Make node_exporter print usage to STDOUT #203\n * Features\n Add conntrack statistics metrics #1155\n Add ethtool stats collector #1832\n Add flag to ignore network speed if it is unknown #1989\n Add tapestats collector for Linux #2044\n Add nvme collector #2062\n * Enhancements\n Add ErrorLog plumbing to promhttp #1887\n Add more Infiniband counters #2019\n netclass: retrieve interface names and filter before parsing #2033\n Add time zone offset metric #2060\n Handle errors from disabled PSI subsystem #1983\n Fix panic when using backwards compatible flags #2000\n Fix wrong value for OpenBSD memory buffer cache #2015\n Only initiate collectors once #2048\n Handle small backwards jumps in CPU idle #2067\n- Apply patch to capture permission denied error for \u0027energy_uj\u0027 file (bsc#1190535)\n\ngrafana:\n\n- Update to version 8.3.5 (jsc#SLE-23439, jsc#SLE-23422)\n + Security:\n * Fixes XSS vulnerability in handling data sources\n (bsc#1195726, CVE-2022-21702)\n * Fixes cross-origin request forgery vulnerability\n (bsc#1195727, CVE-2022-21703)\n * Fixes Insecure Direct Object Reference vulnerability in Teams\n API (bsc#1195728, CVE-2022-21713)\n- Update to Go 1.17.\n- Add build-time dependency on `wire`.\n- Update license to GNU Affero General Public License v3.0.\n- Update to version 8.3.4\n * GetUserInfo: return an error if no user was found\n (bsc#1194873, CVE-2022-21673)\n + Features and enhancements:\n * Alerting: Allow configuration of non-ready alertmanagers.\n * Alerting: Allow customization of Google chat message.\n * AppPlugins: Support app plugins with only default nav.\n * InfluxDB: query editor: skip fields in metadata queries.\n * Postgres/MySQL/MSSQL: Cancel in-flight SQL query if user\n cancels query in grafana.\n * Prometheus: Forward oauth tokens after prometheus datasource\n migration.\n + Bug fixes:\n * Azure Monitor: Bug fix for variable interpolations in metrics\n dropdowns.\n * Azure Monitor: Improved error messages for variable queries.\n * CloudMonitoring: Fixes broken variable queries that use group\n bys.\n * Configuration: You can now see your expired API keys if you\n have no active ones.\n * Elasticsearch: Fix handling multiple datalinks for a single\n field.\n * Export: Fix error being thrown when exporting dashboards\n using query variables that reference the default datasource.\n * ImportDashboard: Fixes issue with importing dashboard and\n name ending up in uid.\n * Login: Page no longer overflows on mobile.\n * Plugins: Set backend metadata property for core plugins.\n * Prometheus: Fill missing steps with null values.\n * Prometheus: Fix interpolation of $__rate_interval variable.\n * Prometheus: Interpolate variables with curly brackets syntax.\n * Prometheus: Respect the http-method data source setting.\n * Table: Fixes issue with field config applied to wrong fields\n when hiding columns.\n * Toolkit: Fix bug with rootUrls not being properly parsed when\n signing a private plugin.\n * Variables: Fix so data source variables are added to adhoc\n configuration.\n + Plugin development fixes \u0026 changes:\n * Toolkit: Revert build config so tslib is bundled with plugins\n to prevent plugins from crashing.\n- Update to version 8.3.3:\n * BarChart: Use new data error view component to show actions\n in panel edit.\n * CloudMonitor: Iterate over pageToken for resources.\n * Macaron: Prevent WriteHeader invalid HTTP status code panic.\n * AnnoListPanel: Fix interpolation of variables in tags.\n * CloudWatch: Allow queries to have no dimensions specified.\n * CloudWatch: Fix broken queries for users migrating from\n 8.2.4/8.2.5 to 8.3.0.\n * CloudWatch: Make sure MatchExact flag gets the right value.\n * Dashboards: Fix so that empty folders can be deleted from the\n manage dashboards/folders page.\n * InfluxDB: Improve handling of metadata query errors in\n InfluxQL.\n * Loki: Fix adding of ad hoc filters for queries with parser\n and line_format expressions.\n * Prometheus: Fix running of exemplar queries for non-histogram\n metrics.\n * Prometheus: Interpolate template variables in interval.\n * StateTimeline: Fix toolitp not showing when for frames with\n multiple fields.\n * TraceView: Fix virtualized scrolling when trace view is\n opened in right pane in Explore.\n * Variables: Fix repeating panels for on time range changed\n variables.\n * Variables: Fix so queryparam option works for scoped\n- Update to version 8.3.2\n + Security: Fixes CVE-2021-43813 and CVE-2021-43815.\n- Update to version 8.3.1\n + Security: Fixes CVE-2021-43798.\n- Update to version 8.3.0\n * Alerting: Prevent folders from being deleted when they\n contain alerts.\n * Alerting: Show full preview value in tooltip.\n * BarGauge: Limit title width when name is really long.\n * CloudMonitoring: Avoid to escape regexps in filters.\n * CloudWatch: Add support for AWS Metric Insights.\n * TooltipPlugin: Remove other panels\u0027 shared tooltip in edit\n panel.\n * Visualizations: Limit y label width to 40% of visualization\n width.\n * Alerting: Clear alerting rule evaluation errors after\n intermittent failures.\n * Alerting: Fix refresh on legacy Alert List panel.\n * Dashboard: Fix queries for panels with non-integer widths.\n * Explore: Fix url update inconsistency.\n * Prometheus: Fix range variables interpolation for time ranges\n smaller than 1 second.\n * ValueMappings: Fixes issue with regex value mapping that only\n sets color.\n- Update to version 8.3.0-beta2\n + Breaking changes:\n * Grafana 8 Alerting enabled by default for installations that\n do not use legacy alerting.\n * Keep Last State for \u0027If execution error or timeout\u0027 when\n upgrading to Grafana 8 alerting.\n * Alerting: Create DatasourceError alert if evaluation returns\n error.\n * Alerting: Make Unified Alerting enabled by default for those\n who do not use legacy alerting.\n * Alerting: Support mute timings configuration through the api\n for the embedded alert manager.\n * CloudWatch: Add missing AWS/Events metrics.\n * Docs: Add easier to find deprecation notices to certain data\n sources and to the changelog.\n * Plugins Catalog: Enable install controls based on the\n pluginAdminEnabled flag.\n * Table: Add space between values for the DefaultCell and\n JSONViewCell.\n * Tracing: Make query editors available in dashboard for Tempo\n and Zipkin.\n * AccessControl: Renamed orgs roles, removed fixed:orgs:reader\n introduced in beta1.\n * Azure Monitor: Add trap focus for modals in grafana/ui and\n other small a11y fixes for Azure Monitor.\n * CodeEditor: Prevent suggestions from being clipped.\n * Dashboard: Fix cache timeout persistence.\n * Datasource: Fix stable sort order of query responses.\n * Explore: Fix error in query history when removing last item.\n * Logs: Fix requesting of older logs when flipped order.\n * Prometheus: Fix running of health check query based on access\n mode.\n * TextPanel: Fix suggestions for existing panels.\n * Tracing: Fix incorrect indentations due to reoccurring\n spanIDs.\n * Tracing: Show start time of trace with milliseconds\n precision.\n * Variables: Make renamed or missing variable section\n expandable.\n * Select: Select menus now properly scroll during keyboard\n navigation.\n- Update to version 8.3.0-beta1\n * Alerting: Add UI for contact point testing with custom\n annotations and labels.\n * Alerting: Make alert state indicator in panel header work\n with Grafana 8 alerts.\n * Alerting: Option for Discord notifier to use webhook name.\n * Annotations: Deprecate AnnotationsSrv.\n * Auth: Omit all base64 paddings in JWT tokens for the JWT\n auth.\n * Azure Monitor: Clean up fields when editing Metrics.\n * AzureMonitor: Add new starter dashboards.\n * AzureMonitor: Add starter dashboard for app monitoring with\n Application Insights.\n * Barchart/Time series: Allow x axis label.\n * CLI: Improve error handling for installing plugins.\n * CloudMonitoring: Migrate to use backend plugin SDK contracts.\n * CloudWatch Logs: Add retry strategy for hitting max\n concurrent queries.\n * CloudWatch: Add AWS RoboMaker metrics and dimension.\n * CloudWatch: Add AWS Transfer metrics and dimension.\n * Dashboard: replace datasource name with a reference object.\n * Dashboards: Show logs on time series when hovering.\n * Elasticsearch: Add support for Elasticsearch 8.0 (Beta).\n * Elasticsearch: Add time zone setting to Date Histogram\n aggregation.\n * Elasticsearch: Enable full range log volume histogram.\n * Elasticsearch: Full range logs volume.\n * Explore: Allow changing the graph type.\n * Explore: Show ANSI colors when highlighting matched words in\n the logs panel.\n * Graph(old) panel: Listen to events from Time series panel.\n * Import: Load gcom dashboards from URL.\n * LibraryPanels: Improves export and import of library panels\n between orgs.\n * OAuth: Support PKCE.\n * Panel edit: Overrides now highlight correctly when searching.\n * PanelEdit: Display drag indicators on draggable sections.\n * Plugins: Refactor Plugin Management.\n * Prometheus: Add custom query parameters when creating\n PromLink url.\n * Prometheus: Remove limits on metrics, labels, and values in\n Metrics Browser.\n * StateTimeline: Share cursor with rest of the panels.\n * Tempo: Add error details when json upload fails.\n * Tempo: Add filtering for service graph query.\n * Tempo: Add links to nodes in Service Graph pointing to\n Prometheus metrics.\n * Time series/Bar chart panel: Add ability to sort series via\n legend.\n * TimeSeries: Allow multiple axes for the same unit.\n * TraceView: Allow span links defined on dataFrame.\n * Transformations: Support a rows mode in labels to fields.\n * ValueMappings: Don\u0027t apply field config defaults to time\n fields.\n * Variables: Only update panels that are impacted by variable\n change.\n * API: Fix dashboard quota limit for imports.\n * Alerting: Fix rule editor issues with Azure Monitor data\n source.\n * Azure monitor: Make sure alert rule editor is not enabled\n when template variables are being used.\n * CloudMonitoring: Fix annotation queries.\n * CodeEditor: Trigger the latest getSuggestions() passed to\n CodeEditor.\n * Dashboard: Remove the current panel from the list of options\n in the Dashboard datasource.\n * Encryption: Fix decrypting secrets in alerting migration.\n * InfluxDB: Fix corner case where index is too large in ALIAS\n * NavBar: Order App plugins alphabetically.\n * NodeGraph: Fix zooming sensitivity on touchpads.\n * Plugins: Add OAuth pass-through logic to api/ds/query\n endpoint.\n * Snapshots: Fix panel inspector for snapshot data.\n * Tempo: Fix basic auth password reset on adding tag.\n * ValueMapping: Fixes issue with regex mappings.\n * grafana/ui: Enable slider marks display.\n- Update to version 8.2.7\n- Update to version 8.2.6\n * Security: Upgrade Docker base image to Alpine 3.14.3.\n * Security: Upgrade Go to 1.17.2.\n * TimeSeries: Fix fillBelowTo wrongly affecting fills of\n unrelated series.\n- Update to version 8.2.5\n * Fix No Data behaviour in Legacy Alerting.\n * Alerting: Fix a bug where the metric in the evaluation string\n was not correctly populated.\n * Alerting: Fix no data behaviour in Legacy Alerting for alert\n rules using the AND operator.\n * CloudMonitoring: Ignore min and max aggregation in MQL\n queries.\n * Dashboards: \u0027Copy\u0027 is no longer added to new dashboard\n titles.\n * DataProxy: Fix overriding response body when response is a\n WebSocket upgrade.\n * Elasticsearch: Use field configured in query editor as field\n for date_histogram aggregations.\n * Explore: Fix running queries without a datasource property\n set.\n * InfluxDB: Fix numeric aliases in queries.\n * Plugins: Ensure consistent plugin settings list response.\n * Tempo: Fix validation of float durations.\n * Tracing: Correct tags for each span are shown.\n- Update to version 8.2.4\n + Security: Fixes CVE-2021-41244.\n- Update to version 8.2.3\n + Security: Fixes CVE-2021-41174.\n- Update to version 8.2.2\n * Annotations: We have improved tag search performance.\n * Application: You can now configure an error-template title.\n * AzureMonitor: We removed a restriction from the resource\n filter query.\n * Packaging: We removed the ProcSubset option in systemd. This\n option prevented Grafana from starting in LXC environments.\n * Prometheus: We removed the autocomplete limit for metrics.\n * Table: We improved the styling of the type icons to make them\n more distinct from column / field name.\n * ValueMappings: You can now use value mapping in stat, gauge,\n bar gauge, and pie chart visualizations.\n * Alerting: Fix panic when Slack\u0027s API sends unexpected\n response.\n * Alerting: The Create Alert button now appears on the\n dashboard panel when you are working with a default\n datasource.\n * Explore: We fixed the problem where the Explore log panel\n disappears when an Elasticsearch logs query returns no\n results.\n * Graph: You can now see annotation descriptions on hover.\n * Logs: The system now uses the JSON parser only if the line is\n parsed to an object.\n * Prometheus: We fixed the issue where the system did not reuse\n TCP connections when querying from Grafana alerting.\n * Prometheus: We fixed the problem that resulted in an error\n when a user created a query with a $__interval min step.\n * RowsToFields: We fixed the issue where the system was not\n properly interpreting number values.\n * Scale: We fixed how the system handles NaN percent when data\n min = data max.\n * Table panel: You can now create a filter that includes\n special characters.\n- Update to version 8.2.1\n * Dashboard: Fix rendering of repeating panels.\n * Datasources: Fix deletion of data source if plugin is not\n found.\n * Packaging: Remove systemcallfilters sections from systemd\n unit files.\n * Prometheus: Add Headers to HTTP client options.\n- Update to version 8.2.0\n * AWS: Updated AWS authentication documentation.\n * Alerting: Added support Alertmanager data source for upstream\n Prometheus AM implementation.\n * Alerting: Allows more characters in label names so\n notifications are sent.\n * Alerting: Get alert rules for a dashboard or a panel using\n /api/v1/rules endpoints.\n * Annotations: Improved rendering performance of event markers.\n * CloudWatch Logs: Skip caching for log queries.\n * Explore: Added an opt-in configuration for Node Graph in\n Jaeger, Zipkin, and Tempo.\n * Packaging: Add stricter systemd unit options.\n * Prometheus: Metrics browser can now handle label values with\n * CodeEditor: Ensure that we trigger the latest onSave callback\n provided to the component.\n * DashboardList/AlertList: Fix for missing All folder value.\n * Plugins: Create a mock icon component to prevent console\n errors.\n- Update to version 8.2.0-beta2\n * AccessControl: Document new permissions restricting data\n source access.\n * TimePicker: Add fiscal years and search to time picker.\n * Alerting: Added support for Unified Alerting with Grafana HA.\n * Alerting: Added support for tune rule evaluation using\n configuration options.\n * Alerting: Cleanups alertmanager namespace from key-value\n store when disabling Grafana 8 alerts.\n * Alerting: Remove ngalert feature toggle and introduce two new\n settings for enabling Grafana 8 alerts and disabling them for\n specific organisations.\n * CloudWatch: Introduced new math expression where it is\n necessary to specify the period field.\n * InfluxDB: Added support for $__interval and $__interval_ms in\n Flux queries for alerting.\n * InfluxDB: Flux queries can use more precise start and end\n timestamps with nanosecond-precision.\n * Plugins Catalog: Make the catalog the default way to interact\n with plugins.\n * Prometheus: Removed autocomplete limit for metrics.\n * Alerting: Fixed an issue where the edit page crashes if you\n tried to preview an alert without a condition set.\n * Alerting: Fixed rules migration to keep existing Grafana 8\n alert rules.\n * Alerting: Fixed the silence file content generated during\n * Analytics: Fixed an issue related to interaction event\n propagation in Azure Application Insights.\n * BarGauge: Fixed an issue where the cell color was lit even\n though there was no data.\n * BarGauge: Improved handling of streaming data.\n * CloudMonitoring: Fixed INT64 label unmarshal error.\n * ConfirmModal: Fixes confirm button focus on modal open.\n * Dashboard: Add option to generate short URL for variables\n with values containing spaces.\n * Explore: No longer hides errors containing refId property.\n * Fixed an issue that produced State timeline panel tooltip\n error when data was not in sync.\n * InfluxDB: InfluxQL query editor is set to always use\n resultFormat.\n * Loki: Fixed creating context query for logs with parsed\n labels.\n * PageToolbar: Fixed alignment of titles.\n * Plugins Catalog: Update to the list of available panels after\n an install, update or uninstall.\n * TimeSeries: Fixed an issue where the shared cursor was not\n showing when hovering over in old Graph panel.\n * Variables: Fixed issues related to change of focus or refresh\n pages when pressing enter in a text box variable input.\n * Variables: Panel no longer crash when using the adhoc\n variable in data links.\n- Update to version 8.2.0-beta1\n * AccessControl: Introduce new permissions to restrict access\n for reloading provisioning configuration.\n * Alerting: Add UI to edit Cortex/Loki namespace, group names,\n and group evaluation interval.\n * Alerting: Add a Test button to test contact point.\n * Alerting: Allow creating/editing recording rules for Loki and\n Cortex.\n * Alerting: Metrics should have the label org instead of user.\n * Alerting: Sort notification channels by name to make them\n easier to locate.\n * Alerting: Support org level isolation of notification\n * AzureMonitor: Add data links to deep link to Azure Portal\n Azure Resource Graph.\n * AzureMonitor: Add support for annotations from Azure Monitor\n Metrics and Azure Resource Graph services.\n * AzureMonitor: Show error message when subscriptions request\n fails in ConfigEditor.\n * Chore: Update to Golang 1.16.7.\n * CloudWatch Logs: Add link to X-Ray data source for trace IDs\n in logs.\n * CloudWatch Logs: Disable query path using websockets (Live)\n feature.\n * CloudWatch/Logs: Don\u0027t group dataframes for non time series\n * Cloudwatch: Migrate queries that use multiple stats to one\n query per stat.\n * Dashboard: Keep live timeseries moving left (v2).\n * Datasources: Introduce response_limit for datasource\n responses.\n * Explore: Add filter by trace or span ID to trace to logs\n * Explore: Download traces as JSON in Explore Inspector.\n * Explore: Reuse Dashboard\u0027s QueryRows component.\n * Explore: Support custom display label for derived fields\n buttons for Loki datasource.\n * Grafana UI: Update monaco-related dependencies.\n * Graphite: Deprecate browser access mode.\n * InfluxDB: Improve handling of intervals in alerting.\n * InfluxDB: InfluxQL query editor: Handle unusual characters in\n tag values better.\n * Jaeger: Add ability to upload JSON file for trace data.\n * LibraryElements: Enable specifying UID for new and existing\n library elements.\n * LibraryPanels: Remove library panel icon from the panel\n header so you can no longer tell that a panel is a library\n panel from the dashboard view.\n * Logs panel: Scroll to the bottom on page refresh when sorting\n in ascending order.\n * Loki: Add fuzzy search to label browser.\n * Navigation: Implement active state for items in the Sidemenu.\n * Packaging: Update PID file location from /var/run to /run.\n * Plugins: Add Hide OAuth Forward config option.\n * Postgres/MySQL/MSSQL: Add setting to limit the maximum number\n of rows processed.\n * Prometheus: Add browser access mode deprecation warning.\n * Prometheus: Add interpolation for built-in-time variables to\n backend.\n * Tempo: Add ability to upload trace data in JSON format.\n * TimeSeries/XYChart: Allow grid lines visibility control in\n XYChart and TimeSeries panels.\n * Transformations: Convert field types to time string number or\n boolean.\n * Value mappings: Add regular-expression based value mapping.\n * Zipkin: Add ability to upload trace JSON.\n * Admin: Prevent user from deleting user\u0027s current/active\n organization.\n * LibraryPanels: Fix library panel getting saved in the\n dashboard\u0027s folder.\n * OAuth: Make generic teams URL and JMES path configurable.\n * QueryEditor: Fix broken copy-paste for mouse middle-click\n * Thresholds: Fix undefined color in \u0027Add threshold\u0027.\n * Timeseries: Add wide-to-long, and fix multi-frame output.\n * TooltipPlugin: Fix behavior of Shared Crosshair when Tooltip\n is set to All.\n * Grafana UI: Fix TS error property css is missing in type.\n- Update to version 8.1.8\n- Update to version 8.1.7\n * Alerting: Fix alerts with evaluation interval more than 30\n seconds resolving before notification.\n * Elasticsearch/Prometheus: Fix usage of proper SigV4 service\n namespace.\n- Update to version 8.1.6\n + Security: Fixes CVE-2021-39226.\n- Update to version 8.1.5\n * BarChart: Fixes panel error that happens on second refresh.\n- Update to version 8.1.4\n + Features and enhancements\n * Explore: Ensure logs volume bar colors match legend colors.\n * LDAP: Search all DNs for users.\n * Alerting: Fix notification channel migration.\n * Annotations: Fix blank panels for queries with unknown data\n sources.\n * BarChart: Fix stale values and x axis labels.\n * Graph: Make old graph panel thresholds work even if ngalert\n is enabled.\n * InfluxDB: Fix regex to identify / as separator.\n * LibraryPanels: Fix update issues related to library panels in\n rows.\n * Variables: Fix variables not updating inside a Panel when the\n preceding Row uses \u0027Repeat For\u0027.\n- Update to version 8.1.3\n + Bug fixes\n * Alerting: Fix alert flapping in the internal alertmanager.\n * Alerting: Fix request handler failed to convert dataframe\n \u0027results\u0027 to plugins.DataTimeSeriesSlice: input frame is not\n recognized as a time series.\n * Dashboard: Fix UIDs are not preserved when importing/creating\n dashboards thru importing .json file.\n * Dashboard: Forces panel re-render when exiting panel edit.\n * Dashboard: Prevent folder from changing when navigating to\n general settings.\n * Docker: Force use of libcrypto1.1 and libssl1.1 versions to\n fix CVE-2021-3711.\n * Elasticsearch: Fix metric names for alert queries.\n * Elasticsearch: Limit Histogram field parameter to numeric\n values.\n * Elasticsearch: Prevent pipeline aggregations to show up in\n terms order by options.\n * LibraryPanels: Prevent duplicate repeated panels from being\n created.\n * Loki: Fix ad-hoc filter in dashboard when used with parser.\n * Plugins: Track signed files + add warn log for plugin assets\n which are not signed.\n * Postgres/MySQL/MSSQL: Fix region annotations not displayed\n correctly.\n * Prometheus: Fix validate selector in metrics browser.\n * Security: Fix stylesheet injection vulnerability.\n * Security: Fix short URL vulnerability.\n- Update to version 8.1.2\n * AzureMonitor: Add support for PostgreSQL and MySQL Flexible\n Servers.\n * Datasource: Change HTTP status code for failed datasource\n health check to 400.\n * Explore: Add span duration to left panel in trace viewer.\n * Plugins: Use file extension allowlist when serving plugin\n assets instead of checking for UNIX executable.\n * Profiling: Add support for binding pprof server to custom\n network interfaces.\n * Search: Make search icon keyboard navigable.\n * Template variables: Keyboard navigation improvements.\n * Tooltip: Display ms within minute time range.\n * Alerting: Fix saving LINE contact point.\n * Annotations: Fix alerting annotation coloring.\n * Annotations: Alert annotations are now visible in the correct\n Panel.\n * Auth: Hide SigV4 config UI and disable middleware when its\n config flag is disabled.\n * Dashboard: Prevent incorrect panel layout by comparing window\n width against theme breakpoints.\n * Explore: Fix showing of full log context.\n * PanelEdit: Fix \u0027Actual\u0027 size by passing the correct panel\n size to Dashboard.\n * Plugins: Fix TLS datasource settings.\n * Variables: Fix issue with empty drop downs on navigation.\n * Variables: Fix URL util converting false into true.\n * Toolkit: Fix matchMedia not found error.\n- Update to version 8.1.1\n * CloudWatch Logs: Fix crash when no region is selected.\n- Update to version 8.1.0\n * Alerting: Deduplicate receivers during migration.\n * ColorPicker: Display colors as RGBA.\n * Select: Make portalling the menu opt-in, but opt-in\n everywhere.\n * TimeRangePicker: Improve accessibility.\n * Annotations: Correct annotations that are displayed upon page\n refresh.\n * Annotations: Fix Enabled button that disappeared from Grafana\n v8.0.6.\n * Annotations: Fix data source template variable that was not\n available for annotations.\n * AzureMonitor: Fix annotations query editor that does not\n load.\n * Geomap: Fix scale calculations.\n * GraphNG: Fix y-axis autosizing.\n * Live: Display stream rate and fix duplicate channels in list\n * Loki: Update labels in log browser when time range changes in\n dashboard.\n * NGAlert: Send resolve signal to alertmanager on alerting -\u003e\n Normal.\n * PasswordField: Prevent a password from being displayed when\n you click the Enter button.\n * Renderer: Remove debug.log file when Grafana is stopped.\n * Security: Update dependencies to fix CVE-2021-36222.\n- Update to version 8.1.0-beta3\n * Alerting: Support label matcher syntax in alert rule list\n filter.\n * IconButton: Put tooltip text as aria-label.\n * Live: Experimental HA with Redis.\n * UI: FileDropzone component.\n * CloudWatch: Add AWS LookoutMetrics.\n * Docker: Fix builds by delaying go mod verify until all\n required files are copied over.\n * Exemplars: Fix disable exemplars only on the query that\n failed.\n * SQL: Fix SQL dataframe resampling (fill mode + time\n intervals).\n- Update to version 8.1.0-beta2\n * Alerting: Expand the value string in alert annotations and\n * Auth: Add Azure HTTP authentication middleware.\n * Auth: Auth: Pass user role when using the authentication\n proxy.\n * Gazetteer: Update countries.json file to allow for linking to\n 3-letter country codes.\n * Config: Fix Docker builds by correcting formatting in\n sample.ini.\n * Explore: Fix encoding of internal URLs.\n- Update to version 8.1.0-beta1\n * Alerting: Add Alertmanager notifications tab.\n * Alerting: Add button to deactivate current Alertmanager\n * Alerting: Add toggle in Loki/Prometheus data source\n configuration to opt out of alerting UI.\n * Alerting: Allow any \u0027evaluate for\u0027 value \u003e=0 in the alert\n rule form.\n * Alerting: Load default configuration from status endpoint, if\n Cortex Alertmanager returns empty user configuration. \n * Alerting: view to display alert rule and its underlying data.\n * Annotation panel: Release the annotation panel.\n * Annotations: Add typeahead support for tags in built-in\n annotations.\n * AzureMonitor: Add curated dashboards for Azure services.\n * AzureMonitor: Add support for deep links to Microsoft Azure\n portal for Metrics.\n * AzureMonitor: Remove support for different credentials for\n Azure Monitor Logs.\n * AzureMonitor: Support querying any Resource for Logs queries.\n * Elasticsearch: Add frozen indices search support.\n * Elasticsearch: Name fields after template variables values\n instead of their name.\n * Elasticsearch: add rate aggregation.\n * Email: Allow configuration of content types for email\n notifications.\n * Explore: Add more meta information when line limit is hit.\n * Explore: UI improvements to trace view.\n * FieldOverrides: Added support to change display name in an\n override field and have it be matched by a later rule.\n * HTTP Client: Introduce dataproxy_max_idle_connections config\n variable.\n * InfluxDB: InfluxQL: adds tags to timeseries data.\n * InfluxDB: InfluxQL: make measurement search case insensitive.\n Legacy Alerting: Replace simplejson with a struct in webhook\n notification channel.\n * Legend: Updates display name for Last (not null) to just\n Last*.\n * Logs panel: Add option to show common labels.\n * Loki: Add $__range variable.\n * Loki: Add support for \u0027label_values(log stream selector,\n label)\u0027 in templating.\n * Loki: Add support for ad-hoc filtering in dashboard.\n * MySQL Datasource: Add timezone parameter.\n * NodeGraph: Show gradient fields in legend.\n * PanelOptions: Don\u0027t mutate panel options/field config object\n when updating.\n * PieChart: Make pie gradient more subtle to match other\n charts.\n * Prometheus: Update PromQL typeahead and highlighting.\n * Prometheus: interpolate variable for step field.\n * Provisioning: Improve validation by validating across all\n dashboard providers.\n * SQL Datasources: Allow multiple string/labels columns with\n time series.\n * Select: Portal select menu to document.body.\n * Team Sync: Add group mapping to support team sync in the\n Generic OAuth provider.\n * Tooltip: Make active series more noticeable.\n * Tracing: Add support to configure trace to logs start and end\n time.\n * Transformations: Skip merge when there is only a single data\n frame.\n * ValueMapping: Added support for mapping text to color,\n boolean values, NaN and Null. Improved UI for value mapping.\n * Visualizations: Dynamically set any config (min, max, unit,\n color, thresholds) from query results.\n * live: Add support to handle origin without a value for the\n port when matching with root_url.\n * Alerting: Handle marshaling Inf values.\n * AzureMonitor: Fix macro resolution for template variables.\n * AzureMonitor: Fix queries with Microsoft.NetApp/../../volumes\n resources.\n * AzureMonitor: Request and concat subsequent resource pages.\n * Bug: Fix parse duration for day.\n * Datasources: Improve error handling for error messages.\n * Explore: Correct the functionality of shift-enter shortcut\n across all uses.\n * Explore: Show all dataFrames in data tab in Inspector.\n * GraphNG: Fix Tooltip mode \u0027All\u0027 for XYChart.\n * Loki: Fix highlight of logs when using filter expressions\n with backticks.\n * Modal: Force modal content to overflow with scroll.\n * Plugins: Ignore symlinked folders when verifying plugin\n signature.\n * Toolkit: Improve error messages when tasks fail.\n- Update to version 8.0.7\n- Update to version 8.0.6\n * Alerting: Add annotation upon alert state change.\n * Alerting: Allow space in label and annotation names.\n * InfluxDB: Improve legend labels for InfluxDB query results.\n * Alerting: Fix improper alert by changing the handling of\n empty labels.\n * CloudWatch/Logs: Reestablish Cloud Watch alert behavior.\n * Dashboard: Avoid migration breaking on fieldConfig without\n defaults field in folded panel.\n * DashboardList: Fix issue not re-fetching dashboard list after\n variable change.\n * Database: Fix incorrect format of isolation level\n configuration parameter for MySQL.\n * InfluxDB: Correct tag filtering on InfluxDB data.\n * Links: Fix links that caused a full page reload.\n * Live: Fix HTTP error when InfluxDB metrics have an incomplete\n or asymmetrical field set.\n * Postgres/MySQL/MSSQL: Change time field to \u0027Time\u0027 for time\n series queries.\n * Postgres: Fix the handling of a null return value in query\n * Tempo: Show hex strings instead of uints for IDs.\n * TimeSeries: Improve tooltip positioning when tooltip\n overflows.\n * Transformations: Add \u0027prepare time series\u0027 transformer.\n- Update to version 8.0.5\n * Cloudwatch Logs: Send error down to client.\n * Folders: Return 409 Conflict status when folder already\n exists.\n * TimeSeries: Do not show series in tooltip if it\u0027s hidden in\n the viz.\n * AzureMonitor: Fix issue where resource group name is missing\n on the resource picker button.\n * Chore: Fix AWS auth assuming role with workspace IAM.\n * DashboardQueryRunner: Fixes unrestrained subscriptions being\n * DateFormats: Fix reading correct setting key for\n use_browser_locale.\n * Links: Fix links to other apps outside Grafana when under sub\n path.\n * Snapshots: Fix snapshot absolute time range issue.\n * Table: Fix data link color.\n * Time Series: Fix X-axis time format when tick increment is\n larger than a year.\n * Tooltip Plugin: Prevent tooltip render if field is undefined.\n- Update to version 8.0.4\n * Live: Rely on app url for origin check.\n * PieChart: Sort legend descending, update placeholder.\n * TimeSeries panel: Do not reinitialize plot when thresholds\n mode change.\n * Elasticsearch: Allow case sensitive custom options in\n date_histogram interval.\n * Elasticsearch: Restore previous field naming strategy when\n using variables.\n * Explore: Fix import of queries between SQL data sources.\n * InfluxDB: InfluxQL query editor: fix retention policy\n handling.\n * Loki: Send correct time range in template variable queries.\n * TimeSeries: Preserve RegExp series overrides when migrating\n from old graph panel.\n- Update to version 8.0.3\n * Alerting: Increase alertmanager_conf column if MySQL.\n * Time series/Bar chart panel: Handle infinite numbers as nulls\n when converting to plot array.\n * TimeSeries: Ensure series overrides that contain color are\n migrated, and migrate the previous fieldConfig when changing\n the panel type.\n * ValueMappings: Improve singlestat value mappings migration.\n * Annotations: Fix annotation line and marker colors.\n * AzureMonitor: Fix KQL template variable queries without\n default workspace.\n * CloudWatch/Logs: Fix missing response data for log queries.\n * LibraryPanels: Fix crash in library panels list when panel\n plugin is not found.\n * LogsPanel: Fix performance drop when moving logs panel in\n * Loki: Parse log levels when ANSI coloring is enabled.\n * MSSQL: Fix issue with hidden queries still being executed.\n * PanelEdit: Display the VisualizationPicker that was not\n displayed if a panel has an unknown panel plugin.\n * Plugins: Fix loading symbolically linked plugins.\n * Prometheus: Fix issue where legend name was replaced with\n name Value in stat and gauge panels.\n * State Timeline: Fix crash when hovering over panel.\n- Update to version 8.0.2\n * Datasource: Add support for max_conns_per_host in dataproxy\n settings.\n * Configuration: Fix changing org preferences in FireFox.\n * PieChart: Fix legend dimension limits.\n * Postgres/MySQL/MSSQL: Fix panic in concurrent map writes.\n * Variables: Hide default data source if missing from regex.\n- Update to version 8.0.1\n * Alerting/SSE: Fix \u0027count_non_null\u0027 reducer validation.\n * Cloudwatch: Fix duplicated time series.\n * Cloudwatch: Fix missing defaultRegion.\n * Dashboard: Fix Dashboard init failed error on dashboards with\n old singlestat panels in collapsed rows.\n * Datasource: Fix storing timeout option as numeric.\n * Postgres/MySQL/MSSQL: Fix annotation parsing for empty\n * Postgres/MySQL/MSSQL: Numeric/non-string values are now\n returned from query variables.\n * Postgres: Fix an error that was thrown when the annotation\n query did not return any results.\n * StatPanel: Fix an issue with the appearance of the graph when\n switching color mode.\n * Visualizations: Fix an issue in the\n Stat/BarGauge/Gauge/PieChart panels where all values mode\n were showing the same name if they had the same value.\n * Toolkit: Resolve external fonts when Grafana is served from a\n sub path.\n- Update to version 8.0.0\n * The following endpoints were deprecated for Grafana v5.0 and\n support for them has now been removed:\n GET /dashboards/db/:slug\n GET /dashboard-solo/db/:slug\n GET /api/dashboard/db/:slug\n DELETE /api/dashboards/db/:slug\n * AzureMonitor: Require default subscription for workspaces()\n template variable query.\n * AzureMonitor: Use resource type display names in the UI.\n * Dashboard: Remove support for loading and deleting dashboard\n by slug.\n * InfluxDB: Deprecate direct browser access in data source.\n * VizLegend: Add a read-only property.\n * AzureMonitor: Fix Azure Resource Graph queries in Azure\n China.\n * Checkbox: Fix vertical layout issue with checkboxes due to\n fixed height.\n * Dashboard: Fix Table view when editing causes the panel data\n to not update.\n * Dashboard: Fix issues where unsaved-changes warning is not\n displayed.\n * Login: Fixes Unauthorized message showing when on login page\n or snapshot page.\n * NodeGraph: Fix sorting markers in grid view.\n * Short URL: Include orgId in generated short URLs.\n * Variables: Support raw values of boolean type.\n- Update to version 8.0.0-beta3\n * The default HTTP method for Prometheus data source is now\n POST.\n * API: Support folder UID in dashboards API.\n * Alerting: Add support for configuring avatar URL for the\n Discord notifier.\n * Alerting: Clarify that Threema Gateway Alerts support only\n Basic IDs.\n * Azure: Expose Azure settings to external plugins.\n * AzureMonitor: Deprecate using separate credentials for Azure\n Monitor Logs.\n * AzureMonitor: Display variables in resource picker for Azure\n * AzureMonitor: Hide application insights for data sources not\n using it.\n * AzureMonitor: Support querying subscriptions and resource\n groups in Azure Monitor Logs.\n * AzureMonitor: remove requirement for default subscription.\n * CloudWatch: Add Lambda@Edge Amazon CloudFront metrics.\n * CloudWatch: Add missing AWS AppSync metrics.\n * ConfirmModal: Auto focus delete button.\n * Explore: Add caching for queries that are run from logs\n * Loki: Add formatting for annotations.\n * Loki: Bring back processed bytes as meta information.\n * NodeGraph: Display node graph collapsed by default with trace\n view.\n * Overrides: Include a manual override option to hide something\n from visualization.\n * PieChart: Support row data in pie charts.\n * Prometheus: Update default HTTP method to POST for existing\n data sources.\n * Time series panel: Position tooltip correctly when window is\n scrolled or resized.\n * Admin: Fix infinite loading edit on the profile page.\n * Color: Fix issues with random colors in string and date\n * Dashboard: Fix issue with title or folder change has no\n effect after exiting settings view.\n * DataLinks: Fix an issue __series.name is not working in data\n link.\n * Datasource: Fix dataproxy timeout should always be applied\n for outgoing data source HTTP requests.\n * Elasticsearch: Fix NewClient not passing httpClientProvider\n to client impl.\n * Explore: Fix Browser title not updated on Navigation to\n Explore.\n * GraphNG: Remove fieldName and hideInLegend properties from\n UPlotSeriesBuilder.\n * OAuth: Fix fallback to auto_assign_org_role setting for Azure\n AD OAuth when no role claims exists.\n * PanelChrome: Fix issue with empty panel after adding a non\n data panel and coming back from panel edit.\n * StatPanel: Fix data link tooltip not showing for single\n value.\n * Table: Fix sorting for number fields.\n * Table: Have text underline for datalink, and add support for\n image datalink.\n * Transformations: Prevent FilterByValue transform from\n crashing panel edit.\n- Update to version 8.0.0-beta2\n * AppPlugins: Expose react-router to apps.\n * AzureMonitor: Add Azure Resource Graph.\n * AzureMonitor: Managed Identity configuration UI.\n * AzureMonitor: Token provider with support for Managed\n Identities.\n * AzureMonitor: Update Logs workspace() template variable query\n to return resource URIs.\n * BarChart: Value label sizing.\n * CloudMonitoring: Add support for preprocessing.\n * CloudWatch: Add AWS/EFS StorageBytes metric.\n * CloudWatch: Allow use of missing AWS namespaces using custom\n * Datasource: Shared HTTP client provider for core backend data\n sources and any data source using the data source proxy.\n * InfluxDB: InfluxQL: allow empty tag values in the query\n editor.\n * Instrumentation: Instrument incoming HTTP request with\n histograms by default.\n * Library Panels: Add name endpoint \u0026 unique name validation to\n AddLibraryPanelModal.\n * Logs panel: Support details view.\n * PieChart: Always show the calculation options dropdown in the\n * PieChart: Remove beta flag.\n * Plugins: Enforce signing for all plugins.\n * Plugins: Remove support for deprecated backend plugin\n protocol version.\n * Tempo/Jaeger: Add better display name to legend.\n * Timeline: Add time range zoom.\n * Timeline: Adds opacity \u0026 line width option.\n * Timeline: Value text alignment option.\n * ValueMappings: Add duplicate action, and disable dismiss on\n backdrop click.\n * Zipkin: Add node graph view to trace response.\n * Annotations panel: Remove subpath from dashboard links.\n * Content Security Policy: Allow all image sources by default.\n * Content Security Policy: Relax default template wrt. loading\n of scripts, due to nonces not working.\n * Datasource: Fix tracing propagation for alert execution by\n introducing HTTP client outgoing tracing middleware.\n * InfluxDB: InfluxQL always apply time interval end.\n * Library Panels: Fixes \u0027error while loading library panels\u0027.\n * NewsPanel: Fixes rendering issue in Safari.\n * PanelChrome: Fix queries being issued again when scrolling in\n and out of view.\n * Plugins: Fix Azure token provider cache panic and auth param\n nil value.\n * Snapshots: Fix key and deleteKey being ignored when creating\n an external snapshot.\n * Table: Fix issue with cell border not showing with colored\n background cells.\n * Table: Makes tooltip scrollable for long JSON values.\n * TimeSeries: Fix for Connected null values threshold toggle\n during panel editing.\n * Variables: Fixes inconsistent selected states on dashboard\n * Variables: Refreshes all panels even if panel is full screen.\n * QueryField: Remove carriage return character from pasted text.\n- Update to version 8.0.0-beta1\n + License update:\n * AGPL License: Update license from Apache 2.0 to the GNU\n Affero General Public License (AGPL).\n * Removes the never refresh option for Query variables.\n * Removes the experimental Tags feature for Variables.\n + Deprecations:\n * The InfoBox \u0026 FeatureInfoBox are now deprecated please use\n the Alert component instead with severity info.\n * API: Add org users with pagination.\n * API: Return 404 when deleting nonexistent API key.\n * API: Return query results as JSON rather than base64 encoded\n Arrow.\n * Alerting: Allow sending notification tags to Opsgenie as\n extra properties.\n * Alerts: Replaces all uses of InfoBox \u0026 FeatureInfoBox with\n Alert.\n * Auth: Add support for JWT Authentication.\n * AzureMonitor: Add support for\n Microsoft.SignalRService/SignalR metrics.\n * AzureMonitor: Azure settings in Grafana server config.\n * AzureMonitor: Migrate Metrics query editor to React.\n * BarChart panel: enable series toggling via legend.\n * BarChart panel: Adds support for Tooltip in BarChartPanel.\n * PieChart panel: Change look of highlighted pie slices.\n * CloudMonitoring: Migrate config editor from angular to react.\n * CloudWatch: Add Amplify Console metrics and dimensions.\n * CloudWatch: Add missing Redshift metrics to CloudWatch data\n * CloudWatch: Add metrics for managed RabbitMQ service.\n * DashboardList: Enable templating on search tag input.\n * Datasource config: correctly remove single custom http\n header.\n * Elasticsearch: Add generic support for template variables.\n * Elasticsearch: Allow omitting field when metric supports\n inline script.\n * Elasticsearch: Allow setting a custom limit for log queries.\n * Elasticsearch: Guess field type from first non-empty value.\n * Elasticsearch: Use application/x-ndjson content type for\n multisearch requests.\n * Elasticsearch: Use semver strings to identify ES version.\n * Explore: Add logs navigation to request more logs.\n * Explore: Map Graphite queries to Loki.\n * Explore: Scroll split panes in Explore independently.\n * Explore: Wrap each panel in separate error boundary.\n * FieldDisplay: Smarter naming of stat values when visualising\n row values (all values) in stat panels.\n * Graphite: Expand metric names for variables.\n * Graphite: Handle unknown Graphite functions without breaking\n the visual editor.\n * Graphite: Show graphite functions descriptions.\n * Graphite: Support request cancellation properly (Uses new\n backendSrv.fetch Observable request API).\n * InfluxDB: Flux: Improve handling of complex\n response-structures.\n * InfluxDB: Support region annotations.\n * Inspector: Download logs for manual processing.\n * Jaeger: Add node graph view for trace.\n * Jaeger: Search traces.\n * Loki: Use data source settings for alerting queries.\n * NodeGraph: Exploration mode.\n * OAuth: Add support for empty scopes.\n * PanelChrome: New logic-less emotion based component with no\n dependency on PanelModel or DashboardModel.\n * PanelEdit: Adds a table view toggle to quickly view data in\n table form.\n * PanelEdit: Highlight matched words when searching options.\n * PanelEdit: UX improvements.\n * Plugins: PanelRenderer and simplified QueryRunner to be used\n from plugins.\n * Plugins: AuthType in route configuration and params\n interpolation.\n * Plugins: Enable plugin runtime install/uninstall\n capabilities.\n * Plugins: Support set body content in plugin routes.\n * Plugins: Introduce marketplace app.\n * Plugins: Moving the DataSourcePicker to grafana/runtime so it\n can be reused in plugins.\n * Prometheus: Add custom query params for alert and exemplars\n * Prometheus: Use fuzzy string matching to autocomplete metric\n names and label.\n * Routing: Replace Angular routing with react-router.\n * Slack: Use chat.postMessage API by default.\n * Tempo: Search for Traces by querying Loki directly from\n Tempo.\n * Tempo: Show graph view of the trace.\n * Themes: Switch theme without reload using global shortcut.\n * TimeSeries panel: Add support for shared cursor.\n * TimeSeries panel: Do not crash the panel if there is no time\n series data in the response.\n * Variables: Do not save repeated panels, rows and scopedVars.\n * Variables: Removes experimental Tags feature.\n * Variables: Removes the never refresh option.\n * Visualizations: Unify tooltip options across visualizations.\n * Visualizations: Refactor and unify option creation between\n new visualizations.\n * Visualizations: Remove singlestat panel.\n * APIKeys: Fixes issue with adding first api key.\n * Alerting: Add checks for non supported units - disable\n defaulting to seconds.\n * Alerting: Fix issue where Slack notifications won\u0027t link to\n user IDs.\n * Alerting: Omit empty message in PagerDuty notifier.\n * AzureMonitor: Fix migration error from older versions of App\n Insights queries.\n * CloudWatch: Fix AWS/Connect dimensions.\n * CloudWatch: Fix broken AWS/MediaTailor dimension name.\n * Dashboards: Allow string manipulation as advanced variable\n format option.\n * DataLinks: Includes harmless extended characters like\n Cyrillic characters.\n * Drawer: Fixes title overflowing its container.\n * Explore: Fix issue when some query errors were not shown.\n * Generic OAuth: Prevent adding duplicated users.\n * Graphite: Handle invalid annotations.\n * Graphite: Fix autocomplete when tags are not available.\n * InfluxDB: Fix Cannot read property \u0027length\u0027 of undefined in\n when parsing response.\n * Instrumentation: Enable tracing when Jaeger host and port are\n * Instrumentation: Prefix metrics with grafana.\n * MSSQL: By default let driver choose port.\n * OAuth: Add optional strict parsing of role_attribute_path.\n * Panel: Fixes description markdown with inline code being\n rendered on newlines and full width.\n * PanelChrome: Ignore data updates \u0026 errors for non data\n panels.\n * Permissions: Fix inherited folder permissions can prevent new\n permissions being added to a dashboard.\n * Plugins: Remove pre-existing plugin installs when installing\n with grafana-cli.\n * Plugins: Support installing to folders with whitespace and\n fix pluginUrl trailing and leading whitespace failures.\n * Postgres/MySQL/MSSQL: Don\u0027t return connection failure details\n to the client.\n * Postgres: Fix ms precision of interval in time group macro\n when TimescaleDB is enabled.\n * Provisioning: Use dashboard checksum field as change\n indicator.\n * SQL: Fix so that all captured errors are returned from sql\n engine.\n * Shortcuts: Fixes panel shortcuts so they always work.\n * Table: Fixes so border is visible for cells with links.\n * Variables: Clear query when data source type changes.\n * Variables: Filters out builtin variables from unknown list.\n * Button: Introduce buttonStyle prop.\n * DataQueryRequest: Remove deprecated props showingGraph and\n showingTabel and exploreMode.\n * grafana/ui: Update React Hook Form to v7.\n * IconButton: Introduce variant for red and blue icon buttons.\n * Plugins: Expose the getTimeZone function to be able to get\n the current selected timeZone.\n * TagsInput: Add className to TagsInput.\n * VizLegend: Move onSeriesColorChanged to PanelContext\n (breaking change).\n- Update to version 7.5.13\n * Alerting: Fix NoDataFound for alert rules using AND operator.\n\nmgr-cfg:\n\n- Version 4.3.6-1\n * Corrected source URL in spec file\n * Fix installation problem for SLE15SP4 due missing python-selinux\n * Fix python selinux package name depending on build target (bsc#1193600)\n * Do not build python 2 package for SLE15SP4 and higher\n * Remove unused legacy code\n\nmgr-custom-info:\n\n- Version 4.3.3-1\n * Remove unused legacy code\n\nmgr-daemon:\n\n- Version 4.3.4-1\n * Corrected source URLs in spec file\n * Update translation strings\n\nmgr-osad:\n\n- Version 4.3.6-1\n * Corrected source URL in spec file.\n * Do not build python 2 package for SLE15SP4 and higher\n * Removed spacewalk-selinux dependencies.\n * Updated source url.\n\nmgr-push:\n\n- Version 4.3.4-1\n * Corrected source URLs in spec file\n\nmgr-virtualization:\n\n- Version 4.3.5-1\n * Corrected source URLs in spec file.\n * Do not build python 2 package for SLE15SP4 and higher\n\nprometheus-blackbox_exporter:\n\n- Enhanced to build on Enterprise Linux 8\n\nprometheus-postgres_exporter:\n\n- Updated for RHEL8.\n\npython-hwdata:\n\n- Require python macros for building\n\nrhnlib:\n\n- Version 4.3.4-1\n * Reorganize python files\n\nspacecmd:\n\n- Version 4.3.11-1\n * on full system update call schedulePackageUpdate API (bsc#1197507)\n * parse boolean paramaters correctly (bsc#1197689)\n * Add parameter to set containerized proxy SSH port\n * Add proxy config generation subcommand\n * Option \u0027org_createfirst\u0027 added to perform initial organization and user creation\n * Added gettext build requirement for RHEL.\n * Removed RHEL 5 references.\n * Include group formulas configuration in spacecmd group_backup and\n spacecmd group_restore. This changes backup format to json,\n previously used plain text is still supported for reading (bsc#1190462)\n * Update translation strings\n * Improved event history listing and added new system_eventdetails \n command to retrieve the details of an event\n * Make schedule_deletearchived to get all actions without display limit\n * Allow passing a date limit for schedule_deletearchived on spacecmd (bsc#1181223)\n\nspacewalk-client-tools:\n\n- Version 4.3.9-1\n * Corrected source URLs in spec file.\n * do not build python 2 package for SLE15\n * Remove unused legacy code\n * Update translation strings\n\nspacewalk-koan:\n\n- Version 4.3.5-1\n * Corrected source URLs in spec file.\n\nspacewalk-oscap:\n\n- Version 4.3.5-1\n * Corrected source URLs in spec file.\n * Do not build python 2 package for SLE15SP4 and higher\n\nspacewalk-remote-utils:\n\n- Version 4.3.3-1\n * Adapt the package for changes in rhnlib\n\nsupportutils-plugin-susemanager-client:\n\n- Version 4.3.2-1\n * Add proxy containers config and logs\n\nsuseRegisterInfo:\n\n- Version 4.3.3-1\n * Bump version to 4.3.0\n\nsupportutils-plugin-salt:\n\n- Add support for Salt Bundle\n\nuyuni-common-libs:\n\n- Version 4.3.4-1\n * implement more decompression algorithms for reposync (bsc#1196704)\n * Reorganize python files\n * Add decompression of zck files to fileutils\n\n", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2022-2134,SUSE-2022-2134,SUSE-OpenStack-Cloud-8-2022-2134,SUSE-OpenStack-Cloud-9-2022-2134,SUSE-OpenStack-Cloud-Crowbar-8-2022-2134,SUSE-OpenStack-Cloud-Crowbar-9-2022-2134,SUSE-SLE-Manager-Tools-12-2022-2134,SUSE-SLE-SAP-12-SP3-2022-2134,SUSE-SLE-SAP-12-SP4-2022-2134,SUSE-SLE-SERVER-12-SP3-2022-2134,SUSE-SLE-SERVER-12-SP3-BCL-2022-2134,SUSE-SLE-SERVER-12-SP4-LTSS-2022-2134,SUSE-SLE-SERVER-12-SP5-2022-2134", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2134-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2134-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222134-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2134-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011316.html" }, { "category": "self", "summary": "SUSE Bug 1181223", "url": "https://bugzilla.suse.com/1181223" }, { "category": "self", "summary": "SUSE Bug 1181400", "url": "https://bugzilla.suse.com/1181400" }, { "category": "self", "summary": "SUSE Bug 1190462", "url": "https://bugzilla.suse.com/1190462" }, { "category": "self", "summary": "SUSE Bug 1190535", "url": "https://bugzilla.suse.com/1190535" }, { "category": "self", "summary": "SUSE Bug 1193600", "url": "https://bugzilla.suse.com/1193600" }, { "category": "self", "summary": "SUSE Bug 1194873", "url": "https://bugzilla.suse.com/1194873" }, { "category": "self", "summary": "SUSE Bug 1195726", "url": "https://bugzilla.suse.com/1195726" }, { "category": "self", "summary": "SUSE Bug 1195727", "url": "https://bugzilla.suse.com/1195727" }, { "category": "self", "summary": "SUSE Bug 1195728", "url": "https://bugzilla.suse.com/1195728" }, { "category": "self", "summary": "SUSE Bug 1196338", "url": "https://bugzilla.suse.com/1196338" }, { "category": "self", "summary": "SUSE Bug 1196704", "url": "https://bugzilla.suse.com/1196704" }, { "category": "self", "summary": "SUSE Bug 1197507", "url": "https://bugzilla.suse.com/1197507" }, { "category": "self", "summary": "SUSE Bug 1197689", "url": "https://bugzilla.suse.com/1197689" }, { "category": "self", "summary": "SUSE CVE CVE-2021-36222 page", "url": "https://www.suse.com/security/cve/CVE-2021-36222/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3711 page", "url": "https://www.suse.com/security/cve/CVE-2021-3711/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39226 page", "url": "https://www.suse.com/security/cve/CVE-2021-39226/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41174 page", "url": "https://www.suse.com/security/cve/CVE-2021-41174/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41244 page", "url": "https://www.suse.com/security/cve/CVE-2021-41244/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43798 page", "url": "https://www.suse.com/security/cve/CVE-2021-43798/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43813 page", "url": "https://www.suse.com/security/cve/CVE-2021-43813/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43815 page", "url": "https://www.suse.com/security/cve/CVE-2021-43815/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21673 page", "url": "https://www.suse.com/security/cve/CVE-2022-21673/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21698 page", "url": "https://www.suse.com/security/cve/CVE-2022-21698/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21702 page", "url": "https://www.suse.com/security/cve/CVE-2022-21702/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21703 page", "url": "https://www.suse.com/security/cve/CVE-2022-21703/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21713 page", "url": "https://www.suse.com/security/cve/CVE-2022-21713/" } ], "title": "Security update for SUSE Manager Client Tools", "tracking": { "current_release_date": "2022-06-20T11:42:14Z", "generator": { "date": "2022-06-20T11:42:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2134-1", "initial_release_date": "2022-06-20T11:42:14Z", "revision_history": [ { "date": "2022-06-20T11:42:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "product": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64" } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "product": { "name": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "product_id": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64" } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "product": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "product_id": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64" } }, { "category": "product_version", "name": "grafana-8.3.5-1.30.3.aarch64", "product": { "name": "grafana-8.3.5-1.30.3.aarch64", "product_id": "grafana-8.3.5-1.30.3.aarch64" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "product": { "name": "prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "product_id": "prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64" } }, { "category": "product_version", "name": "prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "product": { "name": "prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "product_id": "prometheus-postgres_exporter-0.10.0-1.8.2.aarch64" } }, { "category": "product_version", "name": "python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "product": { "name": "python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "product_id": "python2-uyuni-common-libs-4.3.4-1.21.3.aarch64" } }, { "category": "product_version", "name": "uyuni-base-common-4.3.2-1.6.1.aarch64", "product": { "name": "uyuni-base-common-4.3.2-1.6.1.aarch64", "product_id": "uyuni-base-common-4.3.2-1.6.1.aarch64" } }, { "category": "product_version", "name": "uyuni-base-proxy-4.3.2-1.6.1.aarch64", "product": { "name": "uyuni-base-proxy-4.3.2-1.6.1.aarch64", "product_id": "uyuni-base-proxy-4.3.2-1.6.1.aarch64" } }, { "category": "product_version", "name": "uyuni-base-server-4.3.2-1.6.1.aarch64", "product": { "name": "uyuni-base-server-4.3.2-1.6.1.aarch64", "product_id": "uyuni-base-server-4.3.2-1.6.1.aarch64" } }, { "category": "product_version", "name": "wire-0.5.0-1.3.3.aarch64", "product": { "name": "wire-0.5.0-1.3.3.aarch64", "product_id": "wire-0.5.0-1.3.3.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.i586", "product": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.i586", "product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.i586" } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.i586", "product": { "name": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.i586", "product_id": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.i586" } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.i586", "product": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.i586", "product_id": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.i586" } }, { "category": "product_version", "name": "grafana-8.3.5-1.30.3.i586", "product": { "name": "grafana-8.3.5-1.30.3.i586", "product_id": "grafana-8.3.5-1.30.3.i586" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.19.0-1.8.2.i586", "product": { "name": "prometheus-blackbox_exporter-0.19.0-1.8.2.i586", "product_id": "prometheus-blackbox_exporter-0.19.0-1.8.2.i586" } }, { "category": "product_version", "name": "prometheus-postgres_exporter-0.10.0-1.8.2.i586", "product": { "name": "prometheus-postgres_exporter-0.10.0-1.8.2.i586", "product_id": "prometheus-postgres_exporter-0.10.0-1.8.2.i586" } }, { "category": "product_version", "name": "python2-uyuni-common-libs-4.3.4-1.21.3.i586", "product": { "name": "python2-uyuni-common-libs-4.3.4-1.21.3.i586", "product_id": "python2-uyuni-common-libs-4.3.4-1.21.3.i586" } }, { "category": "product_version", "name": "uyuni-base-common-4.3.2-1.6.1.i586", "product": { "name": "uyuni-base-common-4.3.2-1.6.1.i586", "product_id": "uyuni-base-common-4.3.2-1.6.1.i586" } }, { "category": "product_version", "name": "uyuni-base-proxy-4.3.2-1.6.1.i586", "product": { "name": "uyuni-base-proxy-4.3.2-1.6.1.i586", "product_id": "uyuni-base-proxy-4.3.2-1.6.1.i586" } }, { "category": "product_version", "name": "uyuni-base-server-4.3.2-1.6.1.i586", "product": { "name": "uyuni-base-server-4.3.2-1.6.1.i586", "product_id": "uyuni-base-server-4.3.2-1.6.1.i586" } }, { "category": "product_version", "name": "wire-0.5.0-1.3.3.i586", "product": { "name": "wire-0.5.0-1.3.3.i586", "product_id": "wire-0.5.0-1.3.3.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "mgr-cfg-4.3.6-1.27.4.noarch", "product": { "name": "mgr-cfg-4.3.6-1.27.4.noarch", "product_id": "mgr-cfg-4.3.6-1.27.4.noarch" } }, { "category": "product_version", "name": "mgr-cfg-actions-4.3.6-1.27.4.noarch", "product": { "name": "mgr-cfg-actions-4.3.6-1.27.4.noarch", "product_id": "mgr-cfg-actions-4.3.6-1.27.4.noarch" } }, { "category": "product_version", "name": "mgr-cfg-client-4.3.6-1.27.4.noarch", "product": { "name": "mgr-cfg-client-4.3.6-1.27.4.noarch", "product_id": "mgr-cfg-client-4.3.6-1.27.4.noarch" } }, { "category": "product_version", "name": "mgr-cfg-management-4.3.6-1.27.4.noarch", "product": { "name": "mgr-cfg-management-4.3.6-1.27.4.noarch", "product_id": "mgr-cfg-management-4.3.6-1.27.4.noarch" } }, { "category": "product_version", "name": "mgr-custom-info-4.3.3-1.18.1.noarch", "product": { "name": "mgr-custom-info-4.3.3-1.18.1.noarch", "product_id": "mgr-custom-info-4.3.3-1.18.1.noarch" } }, { "category": "product_version", "name": "mgr-daemon-4.3.4-1.32.3.noarch", "product": { "name": "mgr-daemon-4.3.4-1.32.3.noarch", "product_id": "mgr-daemon-4.3.4-1.32.3.noarch" } }, { "category": "product_version", "name": "mgr-osa-dispatcher-4.3.6-1.39.4.noarch", "product": { "name": "mgr-osa-dispatcher-4.3.6-1.39.4.noarch", "product_id": "mgr-osa-dispatcher-4.3.6-1.39.4.noarch" } }, { "category": "product_version", "name": "mgr-osad-4.3.6-1.39.4.noarch", "product": { "name": "mgr-osad-4.3.6-1.39.4.noarch", "product_id": "mgr-osad-4.3.6-1.39.4.noarch" } }, { "category": "product_version", "name": "mgr-push-4.3.4-1.21.4.noarch", "product": { "name": "mgr-push-4.3.4-1.21.4.noarch", "product_id": "mgr-push-4.3.4-1.21.4.noarch" } }, { "category": "product_version", "name": "mgr-virtualization-host-4.3.5-1.29.3.noarch", "product": { "name": "mgr-virtualization-host-4.3.5-1.29.3.noarch", "product_id": "mgr-virtualization-host-4.3.5-1.29.3.noarch" } }, { "category": "product_version", "name": "python2-hwdata-2.3.5-12.9.1.noarch", "product": { "name": "python2-hwdata-2.3.5-12.9.1.noarch", "product_id": "python2-hwdata-2.3.5-12.9.1.noarch" } }, { "category": "product_version", "name": "python2-mgr-cfg-4.3.6-1.27.4.noarch", "product": { "name": "python2-mgr-cfg-4.3.6-1.27.4.noarch", "product_id": "python2-mgr-cfg-4.3.6-1.27.4.noarch" } }, { "category": "product_version", "name": "python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "product": { "name": "python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "product_id": "python2-mgr-cfg-actions-4.3.6-1.27.4.noarch" } }, { "category": "product_version", "name": "python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "product": { "name": "python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "product_id": "python2-mgr-cfg-client-4.3.6-1.27.4.noarch" } }, { "category": "product_version", "name": "python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "product": { "name": "python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "product_id": "python2-mgr-cfg-management-4.3.6-1.27.4.noarch" } }, { "category": "product_version", "name": "python2-mgr-osa-common-4.3.6-1.39.4.noarch", "product": { "name": "python2-mgr-osa-common-4.3.6-1.39.4.noarch", "product_id": "python2-mgr-osa-common-4.3.6-1.39.4.noarch" } }, { "category": "product_version", "name": "python2-mgr-osa-dispatcher-4.3.6-1.39.4.noarch", "product": { "name": "python2-mgr-osa-dispatcher-4.3.6-1.39.4.noarch", "product_id": "python2-mgr-osa-dispatcher-4.3.6-1.39.4.noarch" } }, { "category": "product_version", "name": "python2-mgr-osad-4.3.6-1.39.4.noarch", "product": { "name": "python2-mgr-osad-4.3.6-1.39.4.noarch", "product_id": "python2-mgr-osad-4.3.6-1.39.4.noarch" } }, { "category": "product_version", "name": "python2-mgr-push-4.3.4-1.21.4.noarch", "product": { "name": "python2-mgr-push-4.3.4-1.21.4.noarch", "product_id": "python2-mgr-push-4.3.4-1.21.4.noarch" } }, { "category": "product_version", "name": "python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "product": { "name": "python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "product_id": "python2-mgr-virtualization-common-4.3.5-1.29.3.noarch" } }, { "category": "product_version", "name": "python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "product": { "name": "python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "product_id": "python2-mgr-virtualization-host-4.3.5-1.29.3.noarch" } }, { "category": "product_version", "name": "python2-rhnlib-4.3.4-21.43.3.noarch", "product": { "name": "python2-rhnlib-4.3.4-21.43.3.noarch", "product_id": "python2-rhnlib-4.3.4-21.43.3.noarch" } }, { "category": "product_version", "name": "python2-spacewalk-check-4.3.9-52.71.3.noarch", "product": { "name": "python2-spacewalk-check-4.3.9-52.71.3.noarch", "product_id": "python2-spacewalk-check-4.3.9-52.71.3.noarch" } }, { "category": "product_version", "name": "python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "product": { "name": "python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "product_id": "python2-spacewalk-client-setup-4.3.9-52.71.3.noarch" } }, { "category": "product_version", "name": "python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "product": { "name": "python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "product_id": "python2-spacewalk-client-tools-4.3.9-52.71.3.noarch" } }, { "category": "product_version", "name": "python2-spacewalk-koan-4.3.5-24.33.3.noarch", "product": { "name": "python2-spacewalk-koan-4.3.5-24.33.3.noarch", "product_id": "python2-spacewalk-koan-4.3.5-24.33.3.noarch" } }, { "category": "product_version", "name": "python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "product": { "name": "python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "product_id": "python2-spacewalk-oscap-4.3.5-19.27.1.noarch" } }, { "category": "product_version", "name": "python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "product": { "name": "python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "product_id": "python2-suseRegisterInfo-4.3.3-25.27.3.noarch" } }, { "category": "product_version", "name": "spacecmd-4.3.11-38.103.3.noarch", "product": { "name": "spacecmd-4.3.11-38.103.3.noarch", "product_id": "spacecmd-4.3.11-38.103.3.noarch" } }, { "category": "product_version", "name": "spacewalk-check-4.3.9-52.71.3.noarch", "product": { "name": "spacewalk-check-4.3.9-52.71.3.noarch", "product_id": "spacewalk-check-4.3.9-52.71.3.noarch" } }, { "category": "product_version", "name": "spacewalk-client-setup-4.3.9-52.71.3.noarch", "product": { "name": "spacewalk-client-setup-4.3.9-52.71.3.noarch", "product_id": "spacewalk-client-setup-4.3.9-52.71.3.noarch" } }, { "category": "product_version", "name": "spacewalk-client-tools-4.3.9-52.71.3.noarch", "product": { "name": "spacewalk-client-tools-4.3.9-52.71.3.noarch", "product_id": "spacewalk-client-tools-4.3.9-52.71.3.noarch" } }, { "category": "product_version", "name": "spacewalk-koan-4.3.5-24.33.3.noarch", "product": { "name": "spacewalk-koan-4.3.5-24.33.3.noarch", "product_id": "spacewalk-koan-4.3.5-24.33.3.noarch" } }, { "category": "product_version", "name": "spacewalk-oscap-4.3.5-19.27.1.noarch", "product": { "name": "spacewalk-oscap-4.3.5-19.27.1.noarch", "product_id": "spacewalk-oscap-4.3.5-19.27.1.noarch" } }, { "category": "product_version", "name": "spacewalk-remote-utils-4.3.3-24.24.3.noarch", "product": { "name": "spacewalk-remote-utils-4.3.3-24.24.3.noarch", "product_id": "spacewalk-remote-utils-4.3.3-24.24.3.noarch" } }, { "category": "product_version", "name": "supportutils-plugin-salt-1.2.0-6.16.1.noarch", "product": { "name": "supportutils-plugin-salt-1.2.0-6.16.1.noarch", "product_id": "supportutils-plugin-salt-1.2.0-6.16.1.noarch" } }, { "category": "product_version", "name": "supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "product": { "name": "supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "product_id": "supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch" } }, { "category": "product_version", "name": "suseRegisterInfo-4.3.3-25.27.3.noarch", "product": { "name": "suseRegisterInfo-4.3.3-25.27.3.noarch", "product_id": "suseRegisterInfo-4.3.3-25.27.3.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "product": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le" } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "product": { "name": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "product_id": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le" } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "product": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "product_id": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le" } }, { "category": "product_version", "name": "grafana-8.3.5-1.30.3.ppc64le", "product": { "name": "grafana-8.3.5-1.30.3.ppc64le", "product_id": "grafana-8.3.5-1.30.3.ppc64le" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "product": { "name": "prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "product_id": "prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le" } }, { "category": "product_version", "name": "prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "product": { "name": "prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "product_id": "prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le" } }, { "category": "product_version", "name": "python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "product": { "name": "python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "product_id": "python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le" } }, { "category": "product_version", "name": "uyuni-base-common-4.3.2-1.6.1.ppc64le", "product": { "name": "uyuni-base-common-4.3.2-1.6.1.ppc64le", "product_id": "uyuni-base-common-4.3.2-1.6.1.ppc64le" } }, { "category": "product_version", "name": "uyuni-base-proxy-4.3.2-1.6.1.ppc64le", "product": { "name": "uyuni-base-proxy-4.3.2-1.6.1.ppc64le", "product_id": "uyuni-base-proxy-4.3.2-1.6.1.ppc64le" } }, { "category": "product_version", "name": "uyuni-base-server-4.3.2-1.6.1.ppc64le", "product": { "name": "uyuni-base-server-4.3.2-1.6.1.ppc64le", "product_id": "uyuni-base-server-4.3.2-1.6.1.ppc64le" } }, { "category": "product_version", "name": "wire-0.5.0-1.3.3.ppc64le", "product": { "name": "wire-0.5.0-1.3.3.ppc64le", "product_id": "wire-0.5.0-1.3.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "python2-uyuni-common-libs-4.3.4-1.21.3.s390", "product": { "name": "python2-uyuni-common-libs-4.3.4-1.21.3.s390", "product_id": "python2-uyuni-common-libs-4.3.4-1.21.3.s390" } }, { "category": "product_version", "name": "uyuni-base-common-4.3.2-1.6.1.s390", "product": { "name": "uyuni-base-common-4.3.2-1.6.1.s390", "product_id": "uyuni-base-common-4.3.2-1.6.1.s390" } }, { "category": "product_version", "name": "uyuni-base-proxy-4.3.2-1.6.1.s390", "product": { "name": "uyuni-base-proxy-4.3.2-1.6.1.s390", "product_id": "uyuni-base-proxy-4.3.2-1.6.1.s390" } }, { "category": "product_version", "name": "uyuni-base-server-4.3.2-1.6.1.s390", "product": { "name": "uyuni-base-server-4.3.2-1.6.1.s390", "product_id": "uyuni-base-server-4.3.2-1.6.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "product": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x" } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "product": { "name": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "product_id": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x" } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "product": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "product_id": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x" } }, { "category": "product_version", "name": "grafana-8.3.5-1.30.3.s390x", "product": { "name": "grafana-8.3.5-1.30.3.s390x", "product_id": "grafana-8.3.5-1.30.3.s390x" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "product": { "name": "prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "product_id": "prometheus-blackbox_exporter-0.19.0-1.8.2.s390x" } }, { "category": "product_version", "name": "prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "product": { "name": "prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "product_id": "prometheus-postgres_exporter-0.10.0-1.8.2.s390x" } }, { "category": "product_version", "name": "python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "product": { "name": "python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "product_id": "python2-uyuni-common-libs-4.3.4-1.21.3.s390x" } }, { "category": "product_version", "name": "uyuni-base-common-4.3.2-1.6.1.s390x", "product": { "name": "uyuni-base-common-4.3.2-1.6.1.s390x", "product_id": "uyuni-base-common-4.3.2-1.6.1.s390x" } }, { "category": "product_version", "name": "uyuni-base-proxy-4.3.2-1.6.1.s390x", "product": { "name": "uyuni-base-proxy-4.3.2-1.6.1.s390x", "product_id": "uyuni-base-proxy-4.3.2-1.6.1.s390x" } }, { "category": "product_version", "name": "uyuni-base-server-4.3.2-1.6.1.s390x", "product": { "name": "uyuni-base-server-4.3.2-1.6.1.s390x", "product_id": "uyuni-base-server-4.3.2-1.6.1.s390x" } }, { "category": "product_version", "name": "wire-0.5.0-1.3.3.s390x", "product": { "name": "wire-0.5.0-1.3.3.s390x", "product_id": "wire-0.5.0-1.3.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "product": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "product_id": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" } }, { "category": "product_version", "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "product": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64" } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "product": { "name": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "product_id": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64" } }, { "category": "product_version", "name": "grafana-8.3.5-1.30.3.x86_64", "product": { "name": "grafana-8.3.5-1.30.3.x86_64", "product_id": "grafana-8.3.5-1.30.3.x86_64" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "product": { "name": "prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "product_id": "prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64" } }, { "category": "product_version", "name": "prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "product": { "name": "prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "product_id": "prometheus-postgres_exporter-0.10.0-1.8.2.x86_64" } }, { "category": "product_version", "name": "python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "product": { "name": "python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "product_id": "python2-uyuni-common-libs-4.3.4-1.21.3.x86_64" } }, { "category": "product_version", "name": "uyuni-base-common-4.3.2-1.6.1.x86_64", "product": { "name": "uyuni-base-common-4.3.2-1.6.1.x86_64", "product_id": "uyuni-base-common-4.3.2-1.6.1.x86_64" } }, { "category": "product_version", "name": "uyuni-base-proxy-4.3.2-1.6.1.x86_64", "product": { "name": "uyuni-base-proxy-4.3.2-1.6.1.x86_64", "product_id": "uyuni-base-proxy-4.3.2-1.6.1.x86_64" } }, { "category": "product_version", "name": "uyuni-base-server-4.3.2-1.6.1.x86_64", "product": { "name": "uyuni-base-server-4.3.2-1.6.1.x86_64", "product_id": "uyuni-base-server-4.3.2-1.6.1.x86_64" } }, { "category": "product_version", "name": "wire-0.5.0-1.3.3.x86_64", "product": { "name": "wire-0.5.0-1.3.3.x86_64", "product_id": "wire-0.5.0-1.3.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Manager Client Tools 12", "product": { "name": "SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12" } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64 as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64" }, "product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le" }, "product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x" }, "product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64 as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64" }, "product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64 as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64" }, "product_reference": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le" }, "product_reference": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x" }, "product_reference": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64 as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64" }, "product_reference": "golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64 as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64 as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.3.5-1.30.3.aarch64 as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64" }, "product_reference": "grafana-8.3.5-1.30.3.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.3.5-1.30.3.ppc64le as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le" }, "product_reference": "grafana-8.3.5-1.30.3.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.3.5-1.30.3.s390x as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x" }, "product_reference": "grafana-8.3.5-1.30.3.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.3.5-1.30.3.x86_64 as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64" }, "product_reference": "grafana-8.3.5-1.30.3.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "mgr-cfg-4.3.6-1.27.4.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch" }, "product_reference": "mgr-cfg-4.3.6-1.27.4.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "mgr-cfg-actions-4.3.6-1.27.4.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch" }, "product_reference": "mgr-cfg-actions-4.3.6-1.27.4.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "mgr-cfg-client-4.3.6-1.27.4.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch" }, "product_reference": "mgr-cfg-client-4.3.6-1.27.4.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "mgr-cfg-management-4.3.6-1.27.4.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch" }, "product_reference": "mgr-cfg-management-4.3.6-1.27.4.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "mgr-custom-info-4.3.3-1.18.1.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch" }, "product_reference": "mgr-custom-info-4.3.3-1.18.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "mgr-daemon-4.3.4-1.32.3.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch" }, "product_reference": "mgr-daemon-4.3.4-1.32.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "mgr-osad-4.3.6-1.39.4.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch" }, "product_reference": "mgr-osad-4.3.6-1.39.4.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "mgr-push-4.3.4-1.21.4.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch" }, "product_reference": "mgr-push-4.3.4-1.21.4.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "mgr-virtualization-host-4.3.5-1.29.3.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch" }, "product_reference": "mgr-virtualization-host-4.3.5-1.29.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64 as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-1.8.2.s390x as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64 as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.0-1.8.2.aarch64 as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64" }, "product_reference": "prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le" }, "product_reference": "prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.0-1.8.2.s390x as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x" }, "product_reference": "prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.0-1.8.2.x86_64 as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64" }, "product_reference": "prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-hwdata-2.3.5-12.9.1.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch" }, "product_reference": "python2-hwdata-2.3.5-12.9.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-mgr-cfg-4.3.6-1.27.4.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch" }, "product_reference": "python2-mgr-cfg-4.3.6-1.27.4.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-mgr-cfg-actions-4.3.6-1.27.4.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch" }, "product_reference": "python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-mgr-cfg-client-4.3.6-1.27.4.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch" }, "product_reference": "python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-mgr-cfg-management-4.3.6-1.27.4.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch" }, "product_reference": "python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-mgr-osa-common-4.3.6-1.39.4.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch" }, "product_reference": "python2-mgr-osa-common-4.3.6-1.39.4.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-mgr-osad-4.3.6-1.39.4.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch" }, "product_reference": "python2-mgr-osad-4.3.6-1.39.4.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-mgr-push-4.3.4-1.21.4.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch" }, "product_reference": "python2-mgr-push-4.3.4-1.21.4.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-mgr-virtualization-common-4.3.5-1.29.3.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch" }, "product_reference": "python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-mgr-virtualization-host-4.3.5-1.29.3.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch" }, "product_reference": "python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-rhnlib-4.3.4-21.43.3.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch" }, "product_reference": "python2-rhnlib-4.3.4-21.43.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-spacewalk-check-4.3.9-52.71.3.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch" }, "product_reference": "python2-spacewalk-check-4.3.9-52.71.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-spacewalk-client-setup-4.3.9-52.71.3.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch" }, "product_reference": "python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-spacewalk-client-tools-4.3.9-52.71.3.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch" }, "product_reference": "python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-spacewalk-koan-4.3.5-24.33.3.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch" }, "product_reference": "python2-spacewalk-koan-4.3.5-24.33.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-spacewalk-oscap-4.3.5-19.27.1.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch" }, "product_reference": "python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-suseRegisterInfo-4.3.3-25.27.3.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch" }, "product_reference": "python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-uyuni-common-libs-4.3.4-1.21.3.aarch64 as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64" }, "product_reference": "python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le" }, "product_reference": "python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-uyuni-common-libs-4.3.4-1.21.3.s390x as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x" }, "product_reference": "python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-uyuni-common-libs-4.3.4-1.21.3.x86_64 as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64" }, "product_reference": "python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "spacecmd-4.3.11-38.103.3.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch" }, "product_reference": "spacecmd-4.3.11-38.103.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-check-4.3.9-52.71.3.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch" }, "product_reference": "spacewalk-check-4.3.9-52.71.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-client-setup-4.3.9-52.71.3.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch" }, "product_reference": "spacewalk-client-setup-4.3.9-52.71.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-client-tools-4.3.9-52.71.3.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch" }, "product_reference": "spacewalk-client-tools-4.3.9-52.71.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-koan-4.3.5-24.33.3.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch" }, "product_reference": "spacewalk-koan-4.3.5-24.33.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-oscap-4.3.5-19.27.1.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch" }, "product_reference": "spacewalk-oscap-4.3.5-19.27.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-remote-utils-4.3.3-24.24.3.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch" }, "product_reference": "spacewalk-remote-utils-4.3.3-24.24.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "supportutils-plugin-salt-1.2.0-6.16.1.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch" }, "product_reference": "supportutils-plugin-salt-1.2.0-6.16.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch" }, "product_reference": "supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "suseRegisterInfo-4.3.3-25.27.3.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch" }, "product_reference": "suseRegisterInfo-4.3.3-25.27.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" }, "product_reference": "golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-36222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-36222" } ], "notes": [ { "category": "general", "text": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-36222", "url": "https://www.suse.com/security/cve/CVE-2021-36222" }, { "category": "external", "summary": "SUSE Bug 1188571 for CVE-2021-36222", "url": "https://bugzilla.suse.com/1188571" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-20T11:42:14Z", "details": "important" } ], "title": "CVE-2021-36222" }, { "cve": "CVE-2021-3711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3711" } ], "notes": [ { "category": "general", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3711", "url": "https://www.suse.com/security/cve/CVE-2021-3711" }, { "category": "external", "summary": "SUSE Bug 1189520 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1189520" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1205663 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1205663" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-20T11:42:14Z", "details": "critical" } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2021-39226", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39226" } ], "notes": [ { "category": "general", "text": "Grafana is an open source data visualization platform. In affected versions unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: /dashboard/snapshot/:key, or /api/snapshots/:key. If the snapshot \"public_mode\" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: /api/snapshots-delete/:deleteKey. Regardless of the snapshot \"public_mode\" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: /api/snapshots/:key, or /api/snapshots-delete/:deleteKey. The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss. This issue has been resolved in versions 8.1.6 and 7.5.11. If for some reason you cannot upgrade you can use a reverse proxy or similar to block access to the literal paths: /api/snapshots/:key, /api/snapshots-delete/:deleteKey, /dashboard/snapshot/:key, and /api/snapshots/:key. They have no normal function and can be disabled without side effects.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39226", "url": "https://www.suse.com/security/cve/CVE-2021-39226" }, { "category": "external", "summary": "SUSE Bug 1191454 for CVE-2021-39226", "url": "https://bugzilla.suse.com/1191454" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-20T11:42:14Z", "details": "important" } ], "title": "CVE-2021-39226" }, { "cve": "CVE-2021-41174", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41174" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions if an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim\u0027s browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} ex: {{constructor.constructor(\u0027alert(1)\u0027)()}}. When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. Users are advised to upgrade as soon as possible. If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string {{ in the path.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41174", "url": "https://www.suse.com/security/cve/CVE-2021-41174" }, { "category": "external", "summary": "SUSE Bug 1192383 for CVE-2021-41174", "url": "https://bugzilla.suse.com/1192383" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-20T11:42:14Z", "details": "moderate" } ], "title": "CVE-2021-41174" }, { "cve": "CVE-2021-41244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41244" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions when the fine-grained access control beta feature is enabled and there is more than one organization in the Grafana instance admins are able to access users from other organizations. Grafana 8.0 introduced a mechanism which allowed users with the Organization Admin role to list, add, remove, and update users\u0027 roles in other organizations in which they are not an admin. With fine-grained access control enabled, organization admins can list, add, remove and update users\u0027 roles in another organization, where they do not have organization admin role. All installations between v8.0 and v8.2.3 that have fine-grained access control beta enabled and more than one organization should be upgraded as soon as possible. If you cannot upgrade, you should turn off the fine-grained access control using a feature flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41244", "url": "https://www.suse.com/security/cve/CVE-2021-41244" }, { "category": "external", "summary": "SUSE Bug 1192763 for CVE-2021-41244", "url": "https://bugzilla.suse.com/1192763" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-20T11:42:14Z", "details": "critical" } ], "title": "CVE-2021-41244" }, { "cve": "CVE-2021-43798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43798" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `\u003cgrafana_host_url\u003e/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43798", "url": "https://www.suse.com/security/cve/CVE-2021-43798" }, { "category": "external", "summary": "SUSE Bug 1193492 for CVE-2021-43798", "url": "https://bugzilla.suse.com/1193492" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-20T11:42:14Z", "details": "important" } ], "title": "CVE-2021-43798" }, { "cve": "CVE-2021-43813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43813" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 contains a directory traversal vulnerability for fully lowercase or fully uppercase .md files. The vulnerability is limited in scope, and only allows access to files with the extension .md to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Users should upgrade to patched versions 8.3.2 or 7.5.12. For users who cannot upgrade, running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths. Alternatively, for fully lowercase or fully uppercase .md files, users can block /api/plugins/.*/markdown/.* without losing any functionality beyond inlined plugin help text.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43813", "url": "https://www.suse.com/security/cve/CVE-2021-43813" }, { "category": "external", "summary": "SUSE Bug 1193686 for CVE-2021-43813", "url": "https://bugzilla.suse.com/1193686" }, { "category": "external", "summary": "SUSE Bug 1193688 for CVE-2021-43813", "url": "https://bugzilla.suse.com/1193688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-20T11:42:14Z", "details": "moderate" } ], "title": "CVE-2021-43813" }, { "cve": "CVE-2021-43815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43815" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 has a directory traversal for arbitrary .csv files. It only affects instances that have the developer testing tool called TestData DB data source enabled and configured. The vulnerability is limited in scope, and only allows access to files with the extension .csv to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Versions 8.3.2 and 7.5.12 contain a patch for this issue. There is a workaround available for users who cannot upgrade. Running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43815", "url": "https://www.suse.com/security/cve/CVE-2021-43815" }, { "category": "external", "summary": "SUSE Bug 1193686 for CVE-2021-43815", "url": "https://bugzilla.suse.com/1193686" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-20T11:42:14Z", "details": "moderate" } ], "title": "CVE-2021-43815" }, { "cve": "CVE-2022-21673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21673" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions when a data source has the Forward OAuth Identity feature enabled, sending a query to that datasource with an API token (and no other user credentials) will forward the OAuth Identity of the most recently logged-in user. This can allow API token holders to retrieve data for which they may not have intended access. This attack relies on the Grafana instance having data sources that support the Forward OAuth Identity feature, the Grafana instance having a data source with the Forward OAuth Identity feature toggled on, the Grafana instance having OAuth enabled, and the Grafana instance having usable API keys. This issue has been patched in versions 7.5.13 and 8.3.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21673", "url": "https://www.suse.com/security/cve/CVE-2022-21673" }, { "category": "external", "summary": "SUSE Bug 1194873 for CVE-2022-21673", "url": "https://bugzilla.suse.com/1194873" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-20T11:42:14Z", "details": "moderate" } ], "title": "CVE-2022-21673" }, { "cve": "CVE-2022-21698", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21698" } ], "notes": [ { "category": "general", "text": "client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling around HTTP servers and clients. In client_golang prior to version 1.11.1, HTTP server is susceptible to a Denial of Service through unbounded cardinality, and potential memory exhaustion, when handling requests with non-standard HTTP methods. In order to be affected, an instrumented software must use any of `promhttp.InstrumentHandler*` middleware except `RequestsInFlight`; not filter any specific methods (e.g GET) before middleware; pass metric with `method` label name to our middleware; and not have any firewall/LB/proxy that filters away requests with unknown `method`. client_golang version 1.11.1 contains a patch for this issue. Several workarounds are available, including removing the `method` label name from counter/gauge used in the InstrumentHandler; turning off affected promhttp handlers; adding custom middleware before promhttp handler that will sanitize the request method given by Go http.Request; and using a reverse proxy or web application firewall, configured to only allow a limited set of methods.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21698", "url": "https://www.suse.com/security/cve/CVE-2022-21698" }, { "category": "external", "summary": "SUSE Bug 1196338 for CVE-2022-21698", "url": "https://bugzilla.suse.com/1196338" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-20T11:42:14Z", "details": "important" } ], "title": "CVE-2022-21698" }, { "cve": "CVE-2022-21702", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21702" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site Scripting (XSS) attack. The attacker could either compromise an existing datasource for a specific Grafana instance or either set up its own public service and instruct anyone to set it up in their Grafana instance. To be impacted, all of the following must be applicable. For the data source proxy: A Grafana HTTP-based datasource configured with Server as Access Mode and a URL set, the attacker has to be in control of the HTTP server serving the URL of above datasource, and a specially crafted link pointing at the attacker controlled data source must be clicked on by an authenticated user. For the plugin proxy: A Grafana HTTP-based app plugin configured and enabled with a URL set, the attacker has to be in control of the HTTP server serving the URL of above app, and a specially crafted link pointing at the attacker controlled plugin must be clocked on by an authenticated user. For the backend plugin resource: An attacker must be able to navigate an authenticated user to a compromised plugin through a crafted link. Users are advised to update to a patched version. There are no known workarounds for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21702", "url": "https://www.suse.com/security/cve/CVE-2022-21702" }, { "category": "external", "summary": "SUSE Bug 1195726 for CVE-2022-21702", "url": "https://bugzilla.suse.com/1195726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-20T11:42:14Z", "details": "moderate" } ], "title": "CVE-2022-21702" }, { "cve": "CVE-2022-21703", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21703" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21703", "url": "https://www.suse.com/security/cve/CVE-2022-21703" }, { "category": "external", "summary": "SUSE Bug 1195727 for CVE-2022-21703", "url": "https://bugzilla.suse.com/1195727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-20T11:42:14Z", "details": "moderate" } ], "title": "CVE-2022-21703" }, { "cve": "CVE-2022-21713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21713" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Affected versions of Grafana expose multiple API endpoints which do not properly handle user authorization. `/teams/:teamId` will allow an authenticated attacker to view unintended data by querying for the specific team ID, `/teams/:search` will allow an authenticated attacker to search for teams and see the total number of available teams, including for those teams that the user does not have access to, and `/teams/:teamId/members` when editors_can_admin flag is enabled, an authenticated attacker can see unintended data by querying for the specific team ID. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21713", "url": "https://www.suse.com/security/cve/CVE-2022-21713" }, { "category": "external", "summary": "SUSE Bug 1195728 for CVE-2022-21713", "url": "https://bugzilla.suse.com/1195728" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.aarch64", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.s390x", "SUSE Manager Client Tools 12:golang-github-QubitProducts-exporter_exporter-0.4.0-1.6.1.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-alertmanager-0.23.0-1.12.3.x86_64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.aarch64", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.ppc64le", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.s390x", "SUSE Manager Client Tools 12:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.aarch64", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.ppc64le", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.s390x", "SUSE Manager Client Tools 12:grafana-8.3.5-1.30.3.x86_64", "SUSE Manager Client Tools 12:mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:mgr-custom-info-4.3.3-1.18.1.noarch", "SUSE Manager Client Tools 12:mgr-daemon-4.3.4-1.32.3.noarch", "SUSE Manager Client Tools 12:mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.aarch64", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.ppc64le", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.s390x", "SUSE Manager Client Tools 12:prometheus-postgres_exporter-0.10.0-1.8.2.x86_64", "SUSE Manager Client Tools 12:python2-hwdata-2.3.5-12.9.1.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-actions-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-client-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-cfg-management-4.3.6-1.27.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osa-common-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-osad-4.3.6-1.39.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-push-4.3.4-1.21.4.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-common-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-mgr-virtualization-host-4.3.5-1.29.3.noarch", "SUSE Manager Client Tools 12:python2-rhnlib-4.3.4-21.43.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:python2-suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.aarch64", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.ppc64le", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.s390x", "SUSE Manager Client Tools 12:python2-uyuni-common-libs-4.3.4-1.21.3.x86_64", "SUSE Manager Client Tools 12:spacecmd-4.3.11-38.103.3.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.9-52.71.3.noarch", "SUSE Manager Client Tools 12:spacewalk-koan-4.3.5-24.33.3.noarch", "SUSE Manager Client Tools 12:spacewalk-oscap-4.3.5-19.27.1.noarch", "SUSE Manager Client Tools 12:spacewalk-remote-utils-4.3.3-24.24.3.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-salt-1.2.0-6.16.1.noarch", "SUSE Manager Client Tools 12:supportutils-plugin-susemanager-client-4.3.2-6.24.1.noarch", "SUSE Manager Client Tools 12:suseRegisterInfo-4.3.3-25.27.3.noarch", "SUSE OpenStack Cloud 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:golang-github-prometheus-node_exporter-1.3.0-1.15.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-06-20T11:42:14Z", "details": "moderate" } ], "title": "CVE-2022-21713" } ] }
suse-su-2024:0196-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security Beta update for SUSE Manager Client Tools and Salt", "title": "Title of the patch" }, { "category": "description", "text": "This update fixes the following issues:\n\nansible:\n\n- Update to version 2.9.27 (jsc#SLE-23631) (jsc#SLE-24133)\n * bsc#1187725 CVE-2021-3620 ansible-connection module discloses sensitive\n info in traceback error message (in 2.9.27)\n * bsc#1188061 CVE-2021-3583 Template Injection through yaml multi-line\n strings with ansible facts used in template. (in 2.9.23)\n * bsc#1176460 gh#ansible/ansible#72094 ansible module nmcli is broken in\n ansible 2.9.13 (in 2.9.15)\n- Update to 2.9.22:\n * CVE-2021-3447 (bsc#1183684) multiple modules expose secured values \n * CVE-2021-20228 (bsc#1181935) basic.py no_log with fallback option\n * CVE-2021-20191 (bsc#1181119) multiple collections exposes secured values\n * CVE-2021-20180 (bsc#1180942) bitbucket_pipeline_variable exposes sensitive values\n * CVE-2021-20178 (bsc#1180816) user data leak in snmp_facts module\n\ndracut-saltboot:\n\n- Update to version 0.1.1681904360.84ef141 \n * Load network configuration even when missing protocol version\n (bsc#1210640)\n- Update to verion 0.1.1674034019.a93ff61\n * Install copied wicked config as client.xml (bsc#1205599)\n- Update to version 0.1.1673279145.e7616bd\n * Add failsafe stop file when salt-minion does not stop (bsc#1172110)\n * Copy existing wicked config instead of generating new (bsc#1205599)\n- Update to version 0.1.1665997480.587fa10\n * Add dependencies on xz and gzip to support compressed images\n- Update to version 0.1.1661440542.6cbe0da\n * Use standard susemanager.conf\n * Move image services to dracut-saltboot package\n * Use salt bundle\n- Require e2fsprogs (bsc#1202614)\n- Update to version 0.1.1657643023.0d694ce\n * Update dracut-saltboot dependencies (bsc#1200970)\n * Fix network loading when ipappend is used in pxe config\n * Add new information messages\n\ngolang-github-QubitProducts-exporter_exporter:\n\n- Remove license file from %doc\n- Exclude s390 arch \n- Adapted to build on Enterprise Linux.\n- Fix build for RedHat 7\n- Require Go \u003e= 1.14 also for CentOS\n- Add support for CentOS\n- Replace %{?systemd_requires} with %{?systemd_ordering}\n\ngolang-github-boynux-squid_exporter:\n\n- Exclude s390 architecture (gh#SUSE/spacewalk#19050)\n- Enhanced to build on Enterprise Linux 8.\n\ngolang-github-lusitaniae-apache_exporter:\n\n- Do not strip if SUSE Linux Enterprise 15 SP3\n- Exclude debug for RHEL \u003e= 8\n- Build with Go \u003e= 1.20 when the OS is not RHEL\n- Spec file clean up\n- Fix apparmor profile for SLE 12\n- Do not build with apparmor profile for SLE 12\n- Upgrade to version 1.0.0 (jsc#PED-5405)\n * Improved flag parsing\n * Added support for custom headers\n- Build with Go 1.19\n- Build using promu\n- Add _service file\n- Fix sandboxing options\n- Upgrade to version 0.13.4\n * Fix denial of service vulnerability\n (CVE-2022-32149, bsc#1204501)\n- Upgrade to version 0.13.3\n * Fix uncontrolled resource consumption\n (CVE-2022-41723, bsc#1208270)\n- Upgrade to version 0.13.1\n * Fix panic caused by missing flagConfig options\n- Upgrade to version 0.13.0\n * Fix authentication bypass vulnarability\n (CVE-2022-46146, bsc#1208046)\n- Corrected comment in AppArmor profile\n- Added AppArmor profile\n- Added sandboxing options to systemd service unit\n- Exclude s390 architecture (gh#SUSE/spacewalk#19050)\n- Update to upstream release 0.11.0 (jsc#SLE-24791)\n * Add TLS support\n * Switch to logger, please check --log.level and --log.format\n flags\n- Update to version 0.10.1\n * Bugfix: Reset ProxyBalancer metrics on each scrape to\n remove stale data\n- Update to version 0.10.0\n * Add Apache Proxy and other metrics\n- Update to version 0.8.0\n * Change commandline flags\n * Add metrics: Apache version, request duration total\n- Adapted to build on Enterprise Linux 8\n- Require building with Go 1.15\n- Add support for RedHat 8\n + Adjust dependencies on spec file \n + Disable dwarf compression in go build\n- Add support for Red Hat\n- Add %license macro for LICENSE file \n\ngolang-github-prometheus-prometheus:\n\n- Update to 2.45.0 (jsc#PED-5406):\n * [FEATURE] API: New limit parameter to limit the number of items\n returned by `/api/v1/status/tsdb` endpoint. \n * [FEATURE] Config: Add limits to global config. \n * [FEATURE] Consul SD: Added support for `path_prefix`. \n * [FEATURE] Native histograms: Add option to scrape both classic\n and native histograms. \n * [FEATURE] Native histograms: Added support for two more\n arithmetic operators `avg_over_time` and `sum_over_time`.\n * [FEATURE] Promtool: When providing the block id, only one block\n will be loaded and analyzed. \n * [FEATURE] Remote-write: New Azure ad configuration to support\n remote writing directly to Azure Monitor workspace. \n * [FEATURE] TSDB: Samples per chunk are now configurable with\n flag `storage.tsdb.samples-per-chunk`. By default set to its\n former value 120. \n * [ENHANCEMENT] Native histograms: bucket size can now be limited\n to avoid scrape fails. \n * [ENHANCEMENT] TSDB: Dropped series are now deleted from the WAL\n sooner. \n * [BUGFIX] Native histograms: ChunkSeries iterator now checks if\n a new sample can be appended to the open chunk. \n * [BUGFIX] Native histograms: Fix Histogram Appender\n `Appendable()` segfault. \n * [BUGFIX] Native histograms: Fix setting reset header to gauge\n histograms in seriesToChunkEncoder. \n * [BUGFIX] TSDB: Tombstone intervals are not modified after Get()\n call. \n * [BUGFIX] TSDB: Use path/filepath to set the WAL directory.\n- Update to 2.44.0:\n * [FEATURE] Remote-read: Handle native histograms. \n * [FEATURE] Promtool: Health and readiness check of prometheus\n server in CLI. \n * [FEATURE] PromQL: Add `query_samples_total` metric, the total\n number of samples loaded by all queries.\n * [ENHANCEMENT] Storage: Optimise buffer used to iterate through\n samples.\n * [ENHANCEMENT] Scrape: Reduce memory allocations on target\n labels.\n * [ENHANCEMENT] PromQL: Use faster heap method for `topk()` /\n `bottomk()`.\n * [ENHANCEMENT] Rules API: Allow filtering by rule name.\n * [ENHANCEMENT] Native Histograms: Various fixes and\n improvements.\n * [ENHANCEMENT] UI: Search of scraping pools is now\n case-insensitive.\n * [ENHANCEMENT] TSDB: Add an affirmative log message for\n successful WAL repair.\n * [BUGFIX] TSDB: Block compaction failed when shutting down.\n * [BUGFIX] TSDB: Out-of-order chunks could be ignored if the\n write-behind log was deleted.\n- Update to 2.43.1\n * [BUGFIX] Labels: Set() after Del() would be ignored, which\n broke some relabeling rules.\n- Update to 2.43.0:\n * [FEATURE] Promtool: Add HTTP client configuration to query\n commands.\n * [FEATURE] Scrape: Add `include_scrape_configs` to include\n scrape configs from different files.\n * [FEATURE] HTTP client: Add `no_proxy` to exclude URLs from\n proxied requests.\n * [FEATURE] HTTP client: Add `proxy_from_enviroment` to read\n proxies from env variables.\n * [ENHANCEMENT] API: Add support for setting lookback delta per\n query via the API.\n * [ENHANCEMENT] API: Change HTTP status code from 503/422 to 499\n if a request is canceled.\n * [ENHANCEMENT] Scrape: Allow exemplars for all metric types.\n * [ENHANCEMENT] TSDB: Add metrics for head chunks and WAL folders\n size.\n * [ENHANCEMENT] TSDB: Automatically remove incorrect snapshot\n with index that is ahead of WAL.\n * [ENHANCEMENT] TSDB: Improve Prometheus parser error outputs to\n be more comprehensible.\n * [ENHANCEMENT] UI: Scope `group by` labels to metric in\n autocompletion.\n * [BUGFIX] Scrape: Fix\n `prometheus_target_scrape_pool_target_limit` metric not set\n before reloading.\n * [BUGFIX] TSDB: Correctly update\n `prometheus_tsdb_head_chunks_removed_total` and\n `prometheus_tsdb_head_chunks` metrics when reading WAL.\n * [BUGFIX] TSDB: Use the correct unit (seconds) when recording\n out-of-order append deltas in the\n `prometheus_tsdb_sample_ooo_delta` metric.\n- Update to 2.42.0:\n This release comes with a bunch of feature coverage for native\n histograms and breaking changes.\n If you are trying native histograms already, we recommend you\n remove the `wal` directory when upgrading.\n Because the old WAL record for native histograms is not\n backward compatible in v2.42.0, this will lead to some data\n loss for the latest data.\n Additionally, if you scrape \u0027float histograms\u0027 or use recording\n rules on native histograms in v2.42.0 (which writes float\n histograms), it is a one-way street since older versions do not\n support float histograms.\n * [CHANGE] **breaking** TSDB: Changed WAL record format for the\n experimental native histograms.\n * [FEATURE] Add \u0027keep_firing_for\u0027 field to alerting rules.\n * [FEATURE] Promtool: Add support of selecting timeseries for\n TSDB dump.\n * [ENHANCEMENT] Agent: Native histogram support.\n * [ENHANCEMENT] Rules: Support native histograms in recording\n rules.\n * [ENHANCEMENT] SD: Add container ID as a meta label for pod\n targets for Kubernetes.\n * [ENHANCEMENT] SD: Add VM size label to azure service\n discovery.\n * [ENHANCEMENT] Support native histograms in federation.\n * [ENHANCEMENT] TSDB: Add gauge histogram support.\n * [ENHANCEMENT] TSDB/Scrape: Support FloatHistogram that\n represents buckets as float64 values.\n * [ENHANCEMENT] UI: Show individual scrape pools on /targets\n page.\n- Update to 2.41.0:\n * [FEATURE] Relabeling: Add keepequal and dropequal relabel\n actions.\n * [FEATURE] Add support for HTTP proxy headers. \n * [ENHANCEMENT] Reload private certificates when changed on disk.\n * [ENHANCEMENT] Add max_version to specify maximum TLS version in\n tls_config.\n * [ENHANCEMENT] Add goos and goarch labels to\n prometheus_build_info.\n * [ENHANCEMENT] SD: Add proxy support for EC2 and LightSail SDs.\n * [ENHANCEMENT] SD: Add new metric\n prometheus_sd_file_watcher_errors_total.\n * [ENHANCEMENT] Remote Read: Use a pool to speed up marshalling.\n * [ENHANCEMENT] TSDB: Improve handling of tombstoned chunks in\n iterators.\n * [ENHANCEMENT] TSDB: Optimize postings offset table reading.\n * [BUGFIX] Scrape: Validate the metric name, label names, and\n label values after relabeling.\n * [BUGFIX] Remote Write receiver and rule manager: Fix error\n handling.\n- Update to 2.40.7:\n * [BUGFIX] TSDB: Fix queries involving negative buckets of native\n histograms.\n- Update to 2.40.5:\n * [BUGFIX] TSDB: Fix queries involving native histograms due to\n improper reset of iterators.\n- Update to 2.40.3:\n * [BUGFIX] TSDB: Fix compaction after a deletion is called.\n- Update to 2.40.2:\n * [BUGFIX] UI: Fix black-on-black metric name color in dark mode.\n- Update to 2.40.1:\n * [BUGFIX] TSDB: Fix alignment for atomic int64 for 32 bit\n architecture.\n * [BUGFIX] Scrape: Fix accept headers.\n- Update to 2.40.0:\n * [FEATURE] Add experimental support for native histograms.\n Enable with the flag --enable-feature=native-histograms.\n * [FEATURE] SD: Add service discovery for OVHcloud.\n * [ENHANCEMENT] Kubernetes SD: Use protobuf encoding.\n * [ENHANCEMENT] TSDB: Use golang.org/x/exp/slices for improved\n sorting speed.\n * [ENHANCEMENT] Consul SD: Add enterprise admin partitions. Adds\n __meta_consul_partition label. Adds partition config in\n consul_sd_config.\n * [BUGFIX] API: Fix API error codes for /api/v1/labels and\n /api/v1/series.\n- Update to 2.39.1:\n * [BUGFIX] Rules: Fix notifier relabel changing the labels on\n active alerts.\n- Update to 2.39.0:\n * [FEATURE] experimental TSDB: Add support for ingesting\n out-of-order samples. This is configured via\n out_of_order_time_window field in the config file; check config\n file docs for more info.\n * [ENHANCEMENT] API: /-/healthy and /-/ready API calls now also\n respond to a HEAD request on top of existing GET support.\n * [ENHANCEMENT] PuppetDB SD: Add __meta_puppetdb_query label.\n * [ENHANCEMENT] AWS EC2 SD: Add __meta_ec2_region label.\n * [ENHANCEMENT] AWS Lightsail SD: Add __meta_lightsail_region\n label.\n * [ENHANCEMENT] Scrape: Optimise relabeling by re-using memory.\n * [ENHANCEMENT] TSDB: Improve WAL replay timings.\n * [ENHANCEMENT] TSDB: Optimise memory by not storing unnecessary\n data in the memory.\n * [ENHANCEMENT] TSDB: Allow overlapping blocks by default.\n --storage.tsdb.allow-overlapping-blocks now has no effect.\n * [ENHANCEMENT] UI: Click to copy label-value pair from query\n result to clipboard.\n * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a\n memory leak.\n * [BUGFIX] TSDB: Fix \u0027invalid magic number 0\u0027 error on Prometheus\n startup.\n * [BUGFIX] PromQL: Properly close file descriptor when logging\n unfinished queries.\n * [BUGFIX] Agent: Fix validation of flag options and prevent WAL\n from growing more than desired.\n- Update to 2.38.0:\n * [FEATURE]: Web: Add a /api/v1/format_query HTTP API endpoint\n that allows pretty-formatting PromQL expressions.\n * [FEATURE]: UI: Add support for formatting PromQL expressions in\n the UI.\n * [FEATURE]: DNS SD: Support MX records for discovering targets.\n * [FEATURE]: Templates: Add toTime() template function that\n allows converting sample timestamps to Go time.Time values.\n * [ENHANCEMENT]: Kubernetes SD: Add\n __meta_kubernetes_service_port_number meta label indicating the\n service port number.\n __meta_kubernetes_pod_container_image meta label indicating the\n container image.\n * [ENHANCEMENT]: PromQL: When a query panics, also log the query\n itself alongside the panic message.\n * [ENHANCEMENT]: UI: Tweak colors in the dark theme to improve\n the contrast ratio.\n * [ENHANCEMENT]: Web: Speed up calls to /api/v1/rules by avoiding\n locks and using atomic types instead.\n * [ENHANCEMENT]: Scrape: Add a no-default-scrape-port feature\n flag, which omits or removes any default HTTP (:80) or HTTPS\n (:443) ports in the target\u0027s scrape address.\n * [BUGFIX]: TSDB: In the WAL watcher metrics, expose the\n type=\u0027exemplar\u0027 label instead of type=\u0027unknown\u0027 for exemplar\n records.\n * [BUGFIX]: TSDB: Fix race condition around allocating series IDs\n during chunk snapshot loading.\n- Remove npm_licenses.tar.bz2 during \u0027make clean\u0027\n- Remove web-ui archives during \u0027make clean\u0027.\n- Require promu \u003e= 0.14.0 for building\n- Drop:\n- Upgrade to version 2.37.6\n * Require Go 1.19\n- Upgrade to version 2.37.5\n * [SECURITY] Security upgrade from go and upstream dependencies\n that include security fixes to the net/http and os packages.\n- Upgrade to version 2.37.4\n * [SECURITY] Fix basic authentication bypass vulnerability\n (CVE-2022-46146, bsc#1208049, jsc#PED-3576).\n- Upgrade to version 2.37.3\n * [BUGFIX] Update our regexp library to fix upstream\n CVE-2022-41715.\n- Upgrade to version 2.37.2\n- Upgrade to version 2.37.1\n * [BUGFIX] Properly close file descriptor when logging unfinished\n queries.\n * [BUGFIX] TSDB: In the WAL watcher metrics, expose the\n- Upgrade to version 2.37.0\n * [FEATURE] Nomad SD: New service discovery for Nomad built-in\n service discovery.\n * [ENHANCEMENT] Kubernetes SD: Allow attaching node labels for\n endpoint role.\n * [ENHANCEMENT] PromQL: Optimise creation of signature\n with/without labels.\n * [ENHANCEMENT] TSDB: Memory optimizations.\n * [ENHANCEMENT] TSDB: Reduce sleep time when reading WAL.\n * [ENHANCEMENT] OAuth2: Add appropriate timeouts and User-Agent\n header.\n * [BUGFIX] Alerting: Fix Alertmanager targets not being updated\n when alerts were queued.\n * [BUGFIX] Hetzner SD: Make authentication files relative to\n Prometheus config file.\n * [BUGFIX] Promtool: Fix promtool check config not erroring\n properly on failures.\n * [BUGFIX] Scrape: Keep relabeled scrape interval and timeout on\n reloads.\n * [BUGFIX] TSDB: Don\u0027t increment\n prometheus_tsdb_compactions_failed_total when context is\n canceled.\n * [BUGFIX] TSDB: Fix panic if series is not found when deleting\n series.\n * [BUGFIX] TSDB: Increase\n prometheus_tsdb_mmap_chunk_corruptions_total on out of sequence\n errors.\n * [BUGFIX] Uyuni SD: Make authentication files relative to\n Prometheus configuration file and fix default configuration\n values.\n- Upgrade to version 2.36.2\n * [BUGFIX] Fix serving of static assets like fonts and favicon.\n- Upgrade to version 2.36.1\n * [BUGFIX] promtool: Add --lint-fatal option.\n- Upgrade to version 2.36.0\n * [FEATURE] Add lowercase and uppercase relabel action.\n * [FEATURE] SD: Add IONOS Cloud integration.\n * [FEATURE] SD: Add Vultr integration.\n * [FEATURE] SD: Add Linode SD failure count metric.\n * [FEATURE] Add prometheus_ready metric.\n * [ENHANCEMENT] Add stripDomain to template function.\n * [ENHANCEMENT] UI: Enable active search through dropped targets.\n * [ENHANCEMENT] promtool: support matchers when querying label\n * [ENHANCEMENT] Add agent mode identifier.\n * [BUGFIX] Changing TotalQueryableSamples from int to int64.\n * [BUGFIX] tsdb/agent: Ignore duplicate exemplars.\n * [BUGFIX] TSDB: Fix chunk overflow appending samples at a\n variable rate.\n * [BUGFIX] Stop rule manager before TSDB is stopped.\n- Upgrade to version 2.35.0\n * [CHANGE] TSDB: Delete *.tmp WAL files when Prometheus starts.\n * [CHANGE] promtool: Add new flag --lint (enabled by default) for\n the commands check rules and check config, resulting in a new\n exit code (3) for linter errors.\n * [FEATURE] Support for automatically setting the variable\n GOMAXPROCS to the container CPU limit. Enable with the flag\n --enable-feature=auto-gomaxprocs.\n * [FEATURE] PromQL: Extend statistics with total and peak number\n of samples in a query. Additionally, per-step statistics are\n available with --enable-feature=promql-per-step-stats and using\n stats=all in the query API. Enable with the flag\n --enable-feature=per-step-stats.\n * [ENHANCEMENT] TSDB: more efficient sorting of postings read from\n WAL at startup.\n * [ENHANCEMENT] Azure SD: Add metric to track Azure SD failures.\n * [ENHANCEMENT] Azure SD: Add an optional resource_group\n configuration.\n * [ENHANCEMENT] Kubernetes SD: Support discovery.k8s.io/v1\n EndpointSlice (previously only discovery.k8s.io/v1beta1\n EndpointSlice was supported).\n * [ENHANCEMENT] Kubernetes SD: Allow attaching node metadata to\n discovered pods.\n * [ENHANCEMENT] OAuth2: Support for using a proxy URL to fetch\n OAuth2 tokens.\n * [ENHANCEMENT] Configuration: Add the ability to disable HTTP2.\n * [ENHANCEMENT] Config: Support overriding minimum TLS version.\n * [BUGFIX] Kubernetes SD: Explicitly include gcp auth from k8s.io.\n * [BUGFIX] Fix OpenMetrics parser to sort uppercase labels\n correctly.\n * [BUGFIX] UI: Fix scrape interval and duration tooltip not\n showing on target page.\n * [BUGFIX] Tracing/GRPC: Set TLS credentials only when insecure is\n false.\n * [BUGFIX] Agent: Fix ID collision when loading a WAL with\n multiple segments.\n * [BUGFIX] Remote-write: Fix a deadlock between Batch and flushing\n the queue.\n- Upgrade to version 2.34.0\n * [CHANGE] UI: Classic UI removed.\n * [CHANGE] Tracing: Migrate from Jaeger to OpenTelemetry based\n tracing.\n * [ENHANCEMENT] TSDB: Disable the chunk write queue by default and\n allow configuration with the experimental flag\n --storage.tsdb.head-chunks-write-queue-size.\n * [ENHANCEMENT] HTTP SD: Add a failure counter.\n * [ENHANCEMENT] Azure SD: Set Prometheus User-Agent on requests.\n * [ENHANCEMENT] Uyuni SD: Reduce the number of logins to Uyuni.\n * [ENHANCEMENT] Scrape: Log when an invalid media type is\n encountered during a scrape.\n * [ENHANCEMENT] Scrape: Accept\n application/openmetrics-text;version=1.0.0 in addition to\n version=0.0.1.\n * [ENHANCEMENT] Remote-read: Add an option to not use external\n labels as selectors for remote read.\n * [ENHANCEMENT] UI: Optimize the alerts page and add a search bar.\n * [ENHANCEMENT] UI: Improve graph colors that were hard to see.\n * [ENHANCEMENT] Config: Allow escaping of $ with $$ when using\n environment variables with external labels.\n * [BUGFIX] PromQL: Properly return an error from\n histogram_quantile when metrics have the same labelset.\n * [BUGFIX] UI: Fix bug that sets the range input to the\n resolution.\n * [BUGFIX] TSDB: Fix a query panic when\n memory-snapshot-on-shutdown is enabled.\n * [BUGFIX] Parser: Specify type in metadata parser errors.\n * [BUGFIX] Scrape: Fix label limit changes not applying.\n- Upgrade to version 2.33.5\n * [BUGFIX] Remote-write: Fix deadlock between adding to queue and\n getting batch.\n- Upgrade to version 2.33.4\n * [BUGFIX] TSDB: Fix panic when m-mapping head chunks onto the\n disk.\n- Upgrade to version 2.33.3\n * [BUGFIX] Azure SD: Fix a regression when public IP Address isn\u0027t\n set.\n- Upgrade to version 2.33.2\n * [BUGFIX] Azure SD: Fix panic when public IP Address isn\u0027t set.\n * [BUGFIX] Remote-write: Fix deadlock when stopping a shard.\n- Upgrade to version 2.33.1\n * [BUGFIX] SD: Fix no such file or directory in K8s SD when not\n running inside K8s.\n- Upgrade to version 2.33.0\n * [CHANGE] PromQL: Promote negative offset and @ modifer to stable\n features.\n * [CHANGE] Web: Promote remote-write-receiver to stable.\n * [FEATURE] Config: Add stripPort template function.\n * [FEATURE] Promtool: Add cardinality analysis to check metrics,\n enabled by flag --extended.\n * [FEATURE] SD: Enable target discovery in own K8s namespace.\n * [FEATURE] SD: Add provider ID label in K8s SD.\n * [FEATURE] Web: Add limit field to the rules API.\n * [ENHANCEMENT] Remote-write: Avoid allocations by buffering\n concrete structs instead of interfaces.\n * [ENHANCEMENT] Remote-write: Log time series details for\n out-of-order samples in remote write receiver.\n * [ENHANCEMENT] Remote-write: Shard up more when backlogged.\n * [ENHANCEMENT] TSDB: Use simpler map key to improve exemplar\n ingest performance.\n * [ENHANCEMENT] TSDB: Avoid allocations when popping from the\n intersected postings heap.\n * [ENHANCEMENT] TSDB: Make chunk writing non-blocking, avoiding\n latency spikes in remote-write.\n * [ENHANCEMENT] TSDB: Improve label matching performance.\n * [ENHANCEMENT] UI: Optimize the service discovery page and add a search bar.\n * [ENHANCEMENT] UI: Optimize the target page and add a search bar.\n * [BUGFIX] Promtool: Make exit codes more consistent.\n * [BUGFIX] Promtool: Fix flakiness of rule testing.\n * [BUGFIX] Remote-write: Update\n prometheus_remote_storage_queue_highest_sent_timestamp_seconds\n metric when write irrecoverably fails.\n * [BUGFIX] Storage: Avoid panic in BufferedSeriesIterator.\n * [BUGFIX] TSDB: CompactBlockMetas should produce correct\n mint/maxt for overlapping blocks.\n * [BUGFIX] TSDB: Fix logging of exemplar storage size.\n * [BUGFIX] UI: Fix overlapping click targets for the alert state\n checkboxes.\n * [BUGFIX] UI: Fix Unhealthy filter on target page to actually\n display only Unhealthy targets.\n * [BUGFIX] UI: Fix autocompletion when expression is empty.\n * [BUGFIX] TSDB: Fix deadlock from simultaneous GC and write.\n- Fix authentication bypass by updating Prometheus Exporter Toolkit\n to version 0.7.3 (CVE-2022-46146, bsc#1208049)\n- Fix uncontrolled resource consumption by updating Go to version\n 1.20.1 (CVE-2022-41723, bsc#1208298)\n- Restructure the spec to build web assets online\n * Makefile\n\ngrafana:\n\n- Update to version 9.5.8:\n * Features and enhancements\n GenericOAuth: Set sub as auth id\n * Bug fixes:\n DataSourceProxy: Fix url validation error handling\n- Update to version 9.5.7:\n Alerting: Sort NumberCaptureValues in EvaluationString\n Alerting: Improve performance of matching captures\n Alerting: No longer silence paused alerts during legacy\n migration\n Alerting: Remove and revert flag alertingBigTransactions\n Alerting: Migrate unknown NoData\\Error settings to the default\n Tracing: supply Grafana build version\n Tempo: Escape regex-sensitive characters in span name before\n building promql query\n Plugins: Only configure plugin proxy transport once\n Alerting: Fix unique violation when updating rule group with\n title chains/cycles\n Prometheus: Version detect bug\n Prometheus: Fix heatmap format with no data\n Database: Change getExistingDashboardByTitleAndFolder to get\n dashboard by title, not slug \n Alerting: Convert \u0027Both\u0027 type Prometheus queries to \u0027Range\u0027 in\n SQLStore: Fix Postgres dialect treating \u0027false\u0027 migrator\n default as true\n Alerting: Support newer http_config struct\n InfluxDB: Interpolate retention policies\n StatusHistory: Fix rendering of value-mapped null\n Alerting: Fix provenance guard checks for Alertmanager\n configuration to not cause panic when compared nested\n objects\n AnonymousAuth: Fix concurrent read-write crash\n AzureMonitor: Ensure legacy properties containing template\n variables are correctly migrated\n Explore: Remove data source onboarding page\n Dashboard: Re-align Save form\n Azure Monitor: Fix bug that did not show alert rule preview\n Histogram: Respect min/max panel settings for x-axis\n Heatmap: Fix color rendering for value ranges \u003c 1\n Heatmap: Handle unsorted timestamps in calculate mode\n Google Cloud Monitor: Fix mem usage for dropdown\n AzureMonitor: Fix logs query multi-resource and timespan values\n Utils: Reimplement util.GetRandomString to avoid modulo bias\n Alerting: Fix matching labels with spaces in their values\n Dashboard: Fix applying timezone to datetime variables\n Dashboard: Fix panel description event triggering every time\n panel is rendered\n Tempo: Fix get label values based on CoreApp type\n Heatmap: Fix log scale editor\n Dashboard: Fix disappearing panel when viewed panel is\n refreshed\n Prometheus: Fix bug in creating autocomplete queries with\n labels\n Prometheus: Fix Query Inspector expression range value\n Alerting: Fix migration failing if alert_configuration table is\n not empty\n InfluxDB: Fix querying retention policies on flux mode\n- Update to version 9.5.6:\n * Bug fixes\n Dashboard: Fix library panels in collapsed rows not getting\n updated\n Auth: Add and document option for enabling email lookup\n- Update to version 9.5.5:\n Security: Fix authentication bypass using Azure AD OAuth\n (bsc#1212641, CVE-2023-3128, jsc#PED-3694).\n Auth: Show invite button if disable login form is set to false.\n Azure: Fix Kusto auto-completion for Azure datasources.\n RBAC: Remove legacy AC editor and admin role on new dashboard\n route.\n API: Revert allowing editors to access GET /datasources. \n Settings: Add ability to override skip_org_role_sync with Env\n variables.\n- Update to version 9.5.3:\n Query: Prevent crash while executing concurrent mixed queries\n (bsc#1212099, CVE-2023-2801).\n Alerting: Require alert.notifications:write permissions to test\n receivers and templates (bsc#1212100, CVE-2023-2183).\n- Update to version 9.5.2:\n Alerting: Scheduler use rule fingerprint instead of version.\n Explore: Update table min height.\n DataLinks: Encoded URL fixed.\n TimeSeries: Fix leading null-fill for missing intervals.\n Dashboard: Revert fixed header shown on mobile devices in the\n new panel header.\n PostgreSQL: Fix TLS certificate issue by downgrading lib/pq.\n Provisioning: Fix provisioning issues with legacy alerting and\n data source permissions.\n Alerting: Fix misleading status code in provisioning API.\n Loki: Fix log samples using `instant` queries.\n Panel Header: Implement new Panel Header on Angular Panels.\n Azure Monitor: Fix bug that was not showing resources for\n certain locations.\n Alerting: Fix panic when reparenting receivers to groups\n following an attempted rename via Provisioning.\n Cloudwatch Logs: Clarify Cloudwatch Logs Limits.\n- Update to 9.5.1\n Loki Variable Query Editor: Fix bug when the query is updated\n Expressions: Fix expression load with legacy UID -100\n- Update to 9.5.0 (CVE-2023-1387, bsc#1210907, jsc#PED-3694)\n * Breaking changes\n - default named retention policies won\u0027t be used to query.\n Users who have a default named retention policy in their\n influxdb database, have to rename it to something else.\n Having default named retention policy is not breaking\n anything. We will make sure to use the actual default\n retention policy under the hood. To change the hardcoded\n retention policy in the dashboard.json, users must they\n select the right retention policy from dropdown and save the\n panel/dashboard.\n - Grafana Alerting rules with NoDataState configuration set to\n Alerting will now respect \u0027For\u0027 duration.\n - Users who use LDAP role sync to only sync Viewer, Editor and\n Admin roles, but grant Grafana Server Admin role manually\n will not be able to do that anymore. After this change, LDAP\n role sync will override any manual changes to Grafana Server\n Admin role assignments. If grafana_admin is left unset in\n LDAP role mapping configuration, it will default to false.\n API keys: Add deprecation to api keys.\n API: Enable serving Swagger UI by default and add docs and\n guidelines.\n API: Permit Cache-Control (browser caching) for datasource\n resources.\n Accessibility: Make row actions keyboard accessible.\n Admin/Plugins: Set category filter in connections link.\n Alerting: Add CustomDetails field in PagerDuty contact point.\n Alerting: Add dashboard and panel links to rule and instance\n annotations.\n Alerting: Add filter and remove funcs for custom labels and\n Alerting: Add fuzzy search to alert list view.\n Alerting: Add metrics for active receiver and integrations.\n Alerting: Better printing of labels.\n Alerting: Create new state history \u0027fanout\u0027 backend that\n dispatches to multiple other backends at once.\n Alerting: Enable preview for recording rules.\n Alerting: Fetch all applied alerting configurations.\n Alerting: Introduce proper feature toggles for common state\n history backend combinations.\n Alerting: Make time range query parameters not required when\n querying Loki.\n Alerting: New notification policies view.\n Alerting: No longer index state history log streams by\n instance labels.\n Alerting: Respect \u0027For\u0027 Duration for NoData alerts.\n Alerting: Support filtering rules by multiple datasources.\n Alerting: Switch to snappy-compressed-protobuf for outgoing\n push requests to Loki.\n Angular: Prevent angular from loading when disabled.\n Auth: Add Generic oauth skip org role sync setting.\n Auth: Add feature flag to move token rotation to client.\n Auth: Show user sync external Authentication status.\n Backend: Use sdk version 0.148.0.\n Chore: Add stat for remote cache config.\n Chore: Replace short UID generation with more standard UUIDs.\n Chore: Use DOMPurify to sanitize strings rather than js-xss.\n CloudMonitoring: Add possibility to use path for private key.\n CloudWatch Logs: Update default timeout to 30m.\n CloudWatch: Add AWS/IotSiteWise namespace and metrics.\n CloudWatch: Add account support to variable queries.\n CloudWatch: Make deeplinks work for us-gov and china regions.\n Cloudwatch: Add MeteredIOBytes metric for EFS.\n Command Palette: Display dashboard location.\n Command palette: Enable folder searching.\n Connections: Turn on feature toggle by default.\n Cookies: Provide a mechanism for per user control over cookies.\n Dashboard Datasource: Update Query List \u0026 Improve UX.\n Dashboard: Add a feature that creates a table panel when a\n spreadsheet file is dropped on the dashboard.\n Dashboard: Add new visualization/row/library panel/pasted\n panel is now a dropdown menu.\n Dashboard: Add value format for requests per minute.\n Dashboard: Empty/No Panels dashboard with a new design.\n Dashboard: When dashboard is not found show message instead\n of empty page.\n Dashboards: Enable feature flag newPanelChromeUI by default.\n Dataplane: Support timeSeriesLong without transform.\n Datasources: Add user_agent header customization for outgoing\n HTTP requests.\n Datasources: Use getDefaultQuery in annotations editors.\n Docs: Add documentation on how to debug backend plugins.\n Docs: Deprecate dashboard previews.\n Elasticsearch: Detect Elasticsearch version.\n Elasticsearch: Run Explore queries trough data source backend.\n Explore: Add range option to internal data links.\n Explore: Add transformations to correlation data links.\n Explore: Support mixed data sources for supplementary query.\n Extensions: Expose an enum for available placements.\n Feat: Changing link destination for get more plugins.\n Feat: Linking to plugin details page rather than externally\n for new datasources.\n FieldMatchers: Add match by value (reducer).\n Flame graph: Add context menu.\n Flame graph: Add metadata above flame graph.\n Geomap: Improve tooltip url for photos layer.\n Geomap: Release night / day layer.\n InfluxDB: Move database information into jsondata.\n Jaeger and Zipkin: Config \u0026 docs upgrade.\n LDAP: Allow setting minimum TLS version and accepted ciphers.\n Live: Remove (alpha) ability to configure live pipelines.\n Logger: Add feature toggle for errors in HTTP request logs.\n Login: Allow custom name and icon for social providers.\n Logs Panel: Refactor style generation to improve rendering\n performance.\n Logs: Add millisecond to timestamp in log line.\n Logs: Rename dedup to deduplicate.\n Loki Query Editor: Make Monaco the default editor.\n Loki: Add unpack query builder hint.\n Loki: Add descriptions to query builder operations.\n Loki: Add placeholder to the loki query editor.\n Loki: Always fetch for new label keys in the QueryBuilder.\n Loki: Display error with label filter conflicts.\n Loki: Improve the display of loki query stats.\n MSSQL/Postgres: List views in table dropdown as well.\n MSSQL: Update forked go-mssqldb dependency.\n Metrics: Update comment to mention folders instead of\n dashboards.\n Navigation: Enable new navigation by default.\n NodeGraph: Support icons for nodes.\n Notifications: Enable display of trace ID by default.\n Packaging: Start Grafana service after InfluxDB.\n Panel Header: Add CancelQuery option to panel header.\n Panel: Show multiple errors info in the inspector.\n PanelChrome: Add option to show actions on the right side\n (actions = leftItems).\n Phlare: Allow variables in labelSelector (in query).\n Plugin: Skip preloading disabled app plugins.\n Plugins: Add optional logger for plugin requests sent to backend\n plugins.\n Plugins: Extend panel menu with commands from plugins.\n Plugins: Extend panel menu with links from plugins.\n Plugins: Improve instrumentation by adding metrics and tracing.\n Plugins: Support for distributed tracing in backend plugins SDK.\n Plugins: Support for link extensions.\n Profiling: Enable flame graph \u0026 Phlare/Parca data sources for\n all users.\n Prometheus Datasource: Improve Prom query variable editor.\n Prometheus Metrics: Add missing stat_total_teams metric.\n Prometheus/Loki: Run query explicitly instead of onblur in panel\n edit.\n Prometheus: Browser resource caching.\n Prometheus: Improve prometheus query variable editor.\n Prometheus: Use $__rate_interval for rate queries generated by\n metric browser.\n Pubdash: Email sharing handle dashboard deleted.\n PublicDashboards: Backfills share column with default value.\n PublicDashboards: Configuration modal redesign.\n PublicDashboards: Email sharing.\n PublicDashboards: Enable creation when dashboard has template\n variables.\n PublicDashboards: Paused or deleted public dashboard screen.\n QueryHistory: Improve handling of mixed datasource entries.\n Rendering: Experimental support to use JWTs as auth method.\n SQL Datasources: Add back help content.\n Schema: Remove exclusion for timeseries and update imports.\n Search: Improvements for starred dashboard search.\n Select: Show icon in the grafana/ui Select component.\n Service accounts: Creation logic simplification.\n Service accounts: Remove Add API keys buttons and remove one\n state of migrating for API keys tab.\n SplitOpen: Update API to accept multiple queries.\n Stat Panel: Add an option for a non-gradient/solid background.\n Stat: Add ability to remove default single-color background\n gradient.\n SupportBundles: Add OAuth bundle collectors.\n Table Panel: Add ability to use text color for value or hide\n value in gauge cell.\n Table: Introduce sparkline cell type.\n Tempo: Config and doc updates.\n Tempo: Update service graph view and docs.\n TraceView: Add key and url escaping of json tag values.\n TraceView: Reworked header.\n Tracing: Add more detail to HTTP Outgoing Request.\n Tracing: Docs and config improvements for Tempo/Jaeger/Zipkin.\n Tracing: Support multiple OTel propagators.\n Transformations: Support time format when converting time to\n strings.\n Transformers: Support adding the row index using calculate\n field transformer.\n Units: Format currency with negative before the symbol.\n API: Fix \u0027Updated by\u0027 Column in dashboard versions table.\n AccessControl: Allow editors to access GET /api/datasources.\n Alerting: Add \u0027backend\u0027 label to state history writes metrics.\n Alerting: Add alert instance labels to Loki log lines in\n addition to stream labels.\n Alerting: Elide requests to Loki if nothing should be recorded.\n Alerting: Fix DatasourceUID and RefID missing for\n DatasourceNoData alerts.\n Alerting: Fix ambiguous handling of equals in labels when\n bucketing Loki state history streams.\n Alerting: Fix attachment of external labels to Loki state\n history log streams.\n Alerting: Fix creating a recording rule when having multiple\n datasources.\n Alerting: Fix explore link in alert detail view.\n Alerting: Fix share URL for Prometheus rules on subpath.\n Alerting: Fix stats that display alert count when using unified\n alerting.\n Alerting: Hide mute timing actions when dealing with vanilla\n prometheus.\n Alerting: Paginate result previews.\n Alerting: Prometheus-compatible Alertmanager timings editor.\n Alerting: Update scheduler to get updates only from database.\n Alerting: Use a completely isolated context for state history\n writes.\n Alerting: Use displayNameFromDS if available in preview.\n Annotation List: Fix panel not updating when variable is\n changed.\n Annotations: Ignore unique constraint violations for tags.\n Auth: Fix orgrole picker disabled if isSynced user.\n AzureMonitor: Fix Log Analytics portal links.\n BrowseDashboards: Fix move to General folder not working.\n Catalog: Show install error with incompatible version.\n Chore: Update Grafana to use Alertmanager\n v0.25.1-0.20230308154952-78fedf89728b.\n CloudMonitoring: Add project selector for MQL editor[fix].\n CloudWatch Logs: Fix running logs queries with expressions.\n CloudWatch Logs: Fix to make log queries use a relative time if\n available.\n CloudWatch Logs: Revert \u0027Queries in an expression should run\n synchronously\u0027.\n CloudWatch: Fix cachedQueries insights not being updated for\n metric queries.\n Cloudwatch: Pass refId from query for expression queries.\n Dashboards: Evaluate provisioned dashboard titles in a\n backwards compatible way.\n Dashboards: Fix broken internal data links.\n Database: Don\u0027t sleep 10ms before every request.\n Elasticsearch: Fix processing of response with multiple group\n by for alerting.\n Elasticsearch: Handle multiple annotation structures.\n Email: Mark HTML comments as \u0027safe\u0027 in email templates.\n ErrorHandling: Fixes issues with bad error messages.\n ErrorView: Better detection of no-data responses.\n Explore: Make DataSourcePicker visible on small screens.\n Fix: DataLinks from data sources override user defined data\n link.\n Fix: Top table rendering and update docs.\n Frontend: Fix broken links in /plugins when pathname has a\n trailing slash.\n Geomap: Fix route layer zoom behavior.\n Google Cloud Monitoring: Fix project variable.\n HeatMap: Sort y buckets when all bucket names are numeric.\n InfluxDB: Fix querying with hardcoded retention policy.\n InfluxDB: Fix sending retention policy with InfluxQL queries.\n KVStore: Include database field in migration.\n LDAP: Always synchronize Server Admin role through role sync if\n role sync is enabled.\n Library panels: Ensure pagination controls are always correctly\n displayed.\n Loki: Fix autocomplete situations with multiple escaped quotes.\n MegaMenu: Fixes mega menu showing scroll indicator when it\n shouldn\u0027t.\n Navigation: Redirect to root page when switching organization.\n Navigation: Scrolled hamburger menu links now navigate correctly\n in Safari.\n NestedFolders: Fix nested folder deletion.\n New Panel Header: Fix when clicking submenu item the parent\n menu item onClick get\u0027s triggered.\n Phlare: Fix error when there are no profileTypes to send from\n backend.\n PieChart: Show long labels properly.\n PluginExtensions: Fixed issue with incorrect type being\n exposed when configuring an extension.\n Plugins: Ensure proxy route bodies are valid JSON.\n Plugins: Fix width for README pages with tables.\n Plugins: Markdown fetch retry with lowercase.\n Plugins: Skip instrumenting plugin build info for core and\n bundled plugins.\n PublicDashboards: Query collapsed panels inside rows.\n Query Splitting: Fix for handling queries with no requestId.\n SQL Datasources: Fix variable throwing error if query returns no\n data.\n SQL Datasources: Prevent Call Stack Overflows with Large\n Numbers of Values for Variable.\n SQLStore: Fix SQLite error propagation if query retries are\n disabled.\n Stat Panel: Fix issue with clipping text values.\n Table Panel: Fix panel migration for options cell type.\n Table: Fix migrations from old angular table for cell color\n modes.\n Table: Fixes issue with pagination summary causing scrollbar.\n Table: Fixes table panel gauge alignment.\n TablePanel: Fix table cells overflowing when there are\n multiple data links.\n TablePanel: fix footer bug; no footer calculated values after\n \u0027hidden\u0027 column override.\n Templating: Allow percent encoding of variable with custom all.\n Tempo: Set default limit if none is provided for traceql\n queries.\n TimeSeries: Don\u0027t extend stepped interpolation to graph edges.\n TimeSeries: Improve stacking direction heuristic.\n Trace View: Update the queryType to traceql for checking if\n same trace when clicking span link.\n TraceView: Don\u0027t require preferredVisualisationType to render.\n Utils: Reimplement util.GetRandomString to avoid modulo bias.\n XYChart: Add all dataset columns in tooltip.\n * Plugin development fixes \u0026 changes\n DateTimePicker: Can now select time correctly.\n Grafana UI: Fix tooltip prop of button component.\n DateTimePicker: Add min date support to calendar.\n GrafanaUI: Implement new component Toggletip.\n ContextMenu: Fix padding and show border based on items.\n- Update to 9.4.7 (2023-03-16)\n Alerting: Update scheduler to receive rule updates only from\n database.\n Influxdb: Re-introduce backend migration feature toggle.\n Security: Fixes for CVE-2023-1410.\n The InfluxDB backend migration feature toggle\n (influxdbBackendMigration) has been reintroduced in this\n version as issues were discovered with backend processing of\n InfluxDB data. Unless this feature toggle is enabled, all\n InfluxDB data will be parsed in the frontend. This frontend\n processing is the default behavior.\n In Grafana 9.4.4, InfluxDB data parsing started to be handled\n in the backend. If you have upgraded to 9.4.4 and then added\n new transformations on InfluxDB data, those panels will fail to\n render. To resolve this either:\n Remove the affected panel and re-create it or\n edit the `time` field as `Time` in `panel.json` or\n `dashboard.json`\n as the exporter toolkit has been updated by upstream\n- Install wrapper scripts under /usr/sbin\n- Install actual binaries under /usr/libexec/grafana (or /usr/lib\n under older distributions) and create a simlink for wrapper\n scripts and the service (which expect the binary to be under\n /usr/share/grafana/bin)\n- Update to 9.4.3\n Alerting: Use background context for maintenance function.\n- Update to 9.4.2\n Alerting: Fix boolean default in migration from false to 0.\n- Update to 9.4.0\n Alerting: Add endpoint for querying state history.\n Alerting: Add label query parameters to state history endpoint.\n Alerting: Add static label to all state history entries.\n Alerting: Mark AM configuration as applied.\n Azure Monitor: Enable multiple resource queries.\n Query Caching: Add per-panel query caching TTL.\n Table: Add row number column option.\n Tempo: Remove tempoApmTable feature flag.\n Transformations: Selectively apply transformation to queries.\n AccessControl: Clear user permission cache for update org user\n role.\n Alerting: Fix handling of special floating-point cases\n when writing observed values to annotations.\n Auth: Rotate token patch.\n ContextMenu: Consider y coord when determining bottom\n collision.\n Elasticsearch: Fix consistent label order in alerting.\n Explore: Fix graph not updating when changing config.\n Heatmap: Support heatmap rows with non-timeseries X axis.\n Login: Fix panic when a user is upserted by a background\n process.\n MSSQL: Add support for macro function calls.\n MySQL: Quote identifiers that include special characters.\n Navigation: Sign in button now works correctly when\n served under a sub path.\n Nested Folder: Fix for SQLite not to overwrite the parent on\n restarts.\n PanelChrome: Adds display mode to support transparent option.\n Plugins: Case-sensitive routes for standalone pages.\n Plugins: Prefer to use the data source UID when querying.\n SQLStore: Fix folder migration for MySQL \u003c 5.7.\n Search: Fix not being able to clear sort value.\n Tempo: Fix span name being dropped from the query.\n PanelChrome: Implement hover header.\n- Update to 9.3.7\n Alerting: Validate that tags are 100 characters or less.\n Expressions: Fixes the issue showing expressions editor.\n Logs: Fix stats not being updated when log results change.\n Plugins: Fix circular reference in customOptions leading\n to MarshalJSON errors.\n Time Series Panel: Fix legend text selection in Firefox.\n- Update to 9.3.6\n QueryEditorRow: Fixes issue loading query editor when\n data source variable selected.\n- Update to 9.3.4\n Prometheus: Add default editor configuration.\n TextPanel: Refactor to functional component.\n Alerting: Fix webhook to use correct key for decrypting token.\n Alerting: Set error annotation on EvaluationError regardless of\n underlying error type.\n Datasources: Fix Proxy by UID Failing for UIDs with a Hyphen.\n Fix creating of span link with no tags.\n Elasticsearch: Fix failing requests when using SigV4.\n Elasticsearch: Fix toggle-settings are not shown correctly.\n Explore: Be sure time range key bindings are mounted after\n clear.\n Explore: Unsync time ranges when a pane is closed.\n Logs: Lines with long words do not break properly.\n Loki: Fix misaligned derived fields settings.\n Query Builder: Fix max width of input component to prevent\n overflows.\n Search: Auto focus input elements.\n Search: Fix empty folder message showing when by starred\n dashboards.\n Table Panel: Fix image of image cell overflowing table cell and\n cells ignoring text alignment setting when a data\n link is added.\n- Update to 9.3.2\n Graphite: Process multiple queries to Graphite plugin.\n API: Fix delete user failure due to quota not enabled.\n Accessibility: Improved keyboard accessibility in BarGauge.\n Accessibility: Improved keyboard accessibility in BigValue.\n Alerting: Use the QuotaTargetSrv instead of the QuotaTarget in\n quota check.\n AzureMonitor: Automate location retrieval.\n AzureMonitor: Fix bad request when setting dimensions.\n BarChart: Fix value mappings.\n Build: Streamline and sync dockerfiles.\n Build: Unified dockerfile for all builds.\n CloudWatch: Fix - make sure dimensions are propagated to alert\n query editor.\n Cloudwatch: Fix deeplink with default region.\n Command Palette: Fix not being able to type if triggered\n whilst another modal is open.\n Command Palette: Maintain page state when changing theme.\n Dashboards: Fix \u0027Make Editable\u0027 button not working in\n Dashboard Settings.\n Dashboards: Show error when data source is missing.\n Datasource: Fix - apply default query also to queries in new\n panels.\n Dropdown: Menu now closes correctly when selecting\n options on touch devices.\n Influx: Query segment menus now position correctly near\n the bottom of the screen.\n Login: Fix failure to login a new user via an external\n provider if quota are enabled.\n Loki/Prometheus: Fix wrong queries executed in split view.\n Loki: Fix wrongly escaped label values when using LabelFilter.\n Navigation: Prevent app crash when importing a dashboard with a\n uid of `home`.\n Panel Edit: Fix data links edit icons being off screen when\n provided title is too long.\n Prometheus: Fix exemplar fill color to match series color in\n time series.\n Prometheus: Fix exemplars not respecting corresponding series\n display status.\n StateTimeline: Fix negative infinity legend/tooltip from\n thresholds.\n Table: Fixes row border style not showing and colored\n rows blending together.\n Tempo: Fix TraceQL autocomplete issues.\n TimePicker: Prevent TimePicker overflowing viewport on small\n screens.\n TimeRangePicker: Fix recently ranges only not showing all recent\n ranges.\n TimeZonePicker: Scroll menu correctly when using keyboard\n controls.\n- Update to 9.3.1\n Connections: Update \u0027Your connections/Data sources\u0027 page.\n Accessibility: Increase badge constrast to be WCAG AA compliant.\n- Update to 9.3.0\n Alerting: Enable interpolation for notification policies in file\n provisioning.\n Azure Monitor Logs: Avoid warning when the response is empty.\n Azure Monitor: Add support to customized routes.\n Canvas: Add icon value mapping.\n CloudWatch: Cross-account querying support.\n Docs: Update `merge-pull-request.md` regarding backport\n policies.\n GaugePanel: Setting the neutral-point of a gauge.\n Geomap: Improve location editor.\n Internationalization: Enable internationalization by default.\n Logs: Add `Download logs` button to log log-browser.\n Loki: Add `gzip` compression to resource calls.\n Loki: Add improvements to loki label browser.\n Loki: Make label browser accessible in query builder.\n Loki: Remove raw query toggle.\n Middleware: Add CSP Report Only support.\n Navigation: Prevent viewer role accessing dashboard\n creation, import and folder creation.\n OAuth: Refactor OAuth parameters handling to support\n obtaining refresh tokens for Google OAuth.\n Oauth: Display friendly error message when\n role_attribute_strict=true and no valid role found.\n Preferences: Add confirmation modal when saving org preferences.\n PublicDashboards: Orphaned public dashboard deletion script\n added.\n Query Editor: Hide overflow for long query names.\n Solo Panel: Configurable timezone.\n TablePanel: Add support for Count calculation per column\n or per entire dataset.\n Tempo: Send the correct start time when making a TraceQL query.\n Various Panels: Remove beta label from Bar Chart, Candlestick,\n Histogram, State Timeline, \u0026 Status History\n Panels.\n Access Control: Clear user\u0027s permission cache after resource\n creation.\n Accessibility: Improve keyboard accessibility in\n `AnnoListPanel`.\n Accessibility: Improve keyboard accessibility in `Collapse`.\n `GettingStarted` panel.\n Accessibility: Improve keyboard accessibility of `FilterPill`.\n Admin: Fix broken links to image assets in email templates.\n Azure Monitor: Fix namespace selection for storageaccounts.\n Calcs: Fix difference percent in legend.\n DataLinks: Improve Data-Links AutoComplete Logic.\n Explore: Fix a11y issue with logs navigation buttons.\n Heatmap: Fix blurry text \u0026 rendering.\n Heatmap: Fix tooltip y range of top and bottom buckets in\n calculated heatmaps.\n Logs: Fix misalignment of LogRows.\n Navigation: Stop clearing search state when opening a\n result in a new tab.\n OptionsUI: SliderValueEditor does not get auto focused on\n slider change.\n PanelEdit: Fixes bug with not remembering panel options\n pane collapse/expand state.\n Quota: Fix failure in store due to missing scope parameters.\n Quota: Fix failure when checking session limits.\n StateTimeline: Prevent label text from overflowing state rects.\n Tempo: Fix search table duration unit.\n TraceView: Fix broken rendering when scrolling in Dashboard\n panel in Firefox.\n GrafanaUI: Add disabled option for menu items.\n- Update to 9.2.4\n Access Control: Add an endpoint for setting several managed\n resource permissions.\n Accessibility: Increase `Select` placeholder contrast to\n be WCAG AA compliant.\n Alerting: Append org ID to alert notification URLs.\n Alerting: Make the Grouped view the default one for Rules.\n Build: Remove unnecessary alpine package updates.\n Google Cloud Monitoring: Set frame interval to draw null values.\n Instrumentation: Expose when the binary was built as a gauge.\n Loki: Preserve `X-ID-Token` header.\n Search: Reduce requests in folder view.\n TimeSeries: More thorough detection of negative values for\n auto-stacking direction.\n Alerting: Attempt to preserve UID from migrated legacy channel.\n Alerting: Fix response is not returned for invalid Duration in\n Provisioning API.\n Alerting: Fix screenshot is not taken for stale series.\n Auth: Fix admins not seeing pending invites.\n MSSQL/Postgres: Fix visual query editor filter disappearing.\n Tempo: Fix dropdown issue on tag field focus.\n Timeseries: Fix null pointer when matching fill below to field.\n Toolkit: Fix Webpack less-loader config.\n- Update to 9.2.3\n Docs: Add information about DB version support to upgrade guide.\n Footer: Update footer release notes link to Github changelog.\n Prometheus: Do not drop errors in streaming parser.\n Prometheus: Flavor/version configuration.\n Prometheus: Provide label values match parameter API when\n supported prometheus instance is configured.\n Security: Upgrade x/text to version unaffected by\n CVE-2022-32149.\n Auth: Fix GF_AUTH_JWT_URL_LOGIN env variable doesn\u0027t work.\n Live: Explicitly reply with http 200.\n Prometheus: Fix builder operation mode changing\n multiselect to single select behaviour.\n Security: Fix vulnerabilities in webpack loader-utils.\n- Update to 9.2.2\n Alerting: Add support for wecom apiapp.\n Canvas: Improve resource picker initialization.\n Canvas: Improve text element readability.\n CloudWatch: Make sure adoption tracking is done on valid,\n migrated queries.\n Dashboard: Alerts user to incorrect tag format for JSON import.\n MSSQL: Support tables from all schemas.\n Opentsdb: Allow template variables for filter keys.\n QueryEditor: Revert components from grafana-ui.\n Browse: Fix General folder not showing in FolderPicker.\n Elasticsearch: Fix calculation of trimEdges in alert mode.\n Elasticsearch: Fix trimEdges delete logic in alert mode.\n GoogleOAuth: Unlock User Admin UI.\n LogContext: Fix wrong color of `show context` icon in light\n theme.\n Loki: Fix adding of adhoc filters to stream selector when query\n with empty stream selector.\n Loki: Fix double stringified log-lines when copied via Copy\n button.\n Loki: Fix explain section about $\\_\\_interval variable.\n Loki: Remove already selected options from next label filter\n options in builder.\n NodeGraph: Fix rendering issues when values of arc are over 1.\n PublicDashboards: Fix hidden queries execution.\n Tempo: Fix Node Graph visualization type in dashboard.\n TimeSeries: Fix stacking when first value is negative zero.\n TimeseriesPanel: Fix variables in data links.\n User: Fix externalUserId not being populated.\n We added some components a bit too early to @grafana/ui in 9.2\n so we are moving them back to @grafana/experimental. If you\n used any of these components\n AccessoryButton\n EditorFieldGroup\n EditorHeader\n EditorField\n EditorRow\n EditorList\n EditorRows\n EditorSwitch\n FlexItem\n Stack\n InlineSelect\n InputGroup\n Space\n Please use them from grafana/experimental from now on.\n- Update to 9.2.1\n Alerting: Improve notification policies created during\n migration.\n AzureAD: Add option to force fetch the groups from the\n Graph API.\n Docs: Note end of release notes publication.\n Inspect: Handle JSON tab crash when the provided object\n is too big to stringify.\n TablePanel: Footer now updates values on column filtering.\n Alerting: Fix email image embedding on Windows.\n Alerting: Fix mathexp.NoData for ConditionsCmd.\n Legacy Alerting: Fix duration calculation when testing a rule.\n Loki: Propagate additional headers from Grafana to Loki\n when querying data.\n Search: Sort alphabetically in the folder view, increase\n the limit of the folder search from 50 to 1000.\n TablePanel: Fix last table column to be centered.\n Grafana UI: Export prop types for queryfield, modal and field\n components.\n Toolkit: Fix `Cannot use import statement outside...` error in\n tests.\n- Update to 9.2.0\n Alerting: Add Notification error feedback on contact points\n view.\n Alerting: Allow created by to be manually set when\n there\u0027s no creator for silences.\n Alerting: Expose info about notification delivery errors\n in a new /receivers endpoint.\n Alerting: Update imported prometheus alertmanager version.\n Alerting: Write and Delete multiple alert instances.\n Core: Implement aria attributes for query rows, improve a11y.\n DevEnv: Adds docker block for clickhouse.\n Docker: removes unneccesary use of edge repo.\n Explore: Revert split pane resize feature.\n Frontend: Make local storage items propagate to different tabs\n immediately.\n PublicDashboards: Allow disabling an existent public dashboard\n if it.\n QueryEditorRow: Only pass error to query editor if panel\n is not in a loading state.\n XYChart: Beta release.\n Alerting: Start ticker only when scheduler starts.\n Alerting: Fix pq: missing FROM-clause for table \u0027a\u0027.\n AzureMonitor: Correctly update subscriptions value in ARG\n editor.\n Chore: Regenerate swagger specification and fix validation\n failures.\n Correlations: Only return correlation for which both\n source and target datasources exist.\n Explore: Prevent panes from disappearing when resizing\n window in split view.\n Links: Fix opening links from different orgs on the same tab.\n LogContext: Fix scroll position in upper context group.\n Logs: Show copy button independently from context.\n Loki/Prometheus: Fix adding of ad hoc filters when\n jumping from dashboard to explore.\n Loki: Add support for range aggregations with by grouping.\n Loki: Fix label-value escaping in context query.\n Loki: Fix redundant escaping in adhoc filter with regex match.\n PanelEdit: Fixes resize pane border and spacing issues.\n RBAC: Redirect to /login when forceLogin is set.\n Security: Fix CVE-2022-27664.\n StateTimeline: Fix tooltip showing erroneously in shared\n crosshair dashboards.\n Tempo: Fix unexpected trimming of leading zeroes in traceID.\n Tracing: Fix bug where errors are not reported to OpenTelemetry.\n- Update to 9.1.8\n Alerting: Fix evaluation interval validation.\n Alerting: Fix migration to create rules with group index 1.\n Alerting: Fix migration to not add label \u0027alertname\u0027.\n Azure Monitor: Fix empty Logs response for Alerting.\n Azure Monitor: Fix subscription selector when changing data\n sources.\n Google Cloud Monitoring: Fix bucket bound for distributions.\n- Update to 9.1.7\n CloudWatch: Add missing AWS/Prometheus metrics.\n Explore: Add feature tracking events.\n Graphite: Add error information to graphite queries tracing.\n Prometheus: Restore FromAlert header.\n Search: Add search index configuration options.\n Thresholds: Add option for dashed line style.\n Alerting: Fix default query\u0027s data source when no default\n datasource specified.\n Alerting: Fix mathexp.NoData cannot be reduced.\n Alerting: Skip unsupported file types on provisioning.\n AzureMonitor: Ensure resourceURI template variable is migrated.\n Dashboard: Fix plugin dashboard save as button.\n Docs: Fix decimals: auto docs for panel edit.\n Fix: RBAC handle `error no resolver` found.\n LibraryPanelSearch: Refactor and fix hyphen issue.\n Live: Fix live streaming with `live-service-web-worker` feature\n flag enabled.\n QueryField: Fix wrong cursor position on autocomplete.\n- Update to 9.1.6\n DataSource: Adding possibility to hide queries from the\n inspector.\n Inspect: Hide Actions tab when it is empty.\n PanelMenu: Remove hide legend action as it was showing on\n all panel types.\n Provisioning Contact points: Support disableResolveMessage via\n YAML.\n PublicDashboards: Support subpaths when generating pubdash url.\n Alerting: Fix legacy migration crash when rule name is too long.\n Alerting: Fix send resolved notifications.\n Azure Monitor: Fix migration issue with MetricDefinitionsQuery\n template variable query types.\n Browse: Hide dashboard actions if user does not have enough\n permission.\n ElasticSearch: Fix dispatching queries at a wrong time.\n Panel: Disable legends when showLegend is false prior to\n schema v37.\n Prometheus: Fix metadata requests for browser access mode.\n Search: Avoid requesting all dashboards when in Folder View.\n TablePanel/StatPanel: Fix values not being visible when\n background transparent.\n- Update to 9.1.5\n Alerting: Sanitize invalid label/annotation names for external\n alertmanagers.\n Alerting: Telegram: Truncate long messages to avoid send error.\n DisplayProcessor: Handle reverse-ordered data when auto-showing\n millis.\n Heatmap: Add option to reverse color scheme.\n PluginLoader: Alias slate-react as @grafana/slate-react.\n Search: Add substring matcher, to bring back the old\n dashboard search behavior.\n Traces: More visible span colors.\n Alerting: Fix incorrect propagation of org ID and other\n fields in rule provisioning endpoints.\n Alerting: Resetting the notification policy tree to the default\n policy will also restore default contact points.\n AzureMonitor: Fix custom namespaces.\n AzureMonitor: Fix issue where custom metric namespaces\n are not included in the metric namespace list.\n CloudWatch: Fix display name of metric and namespace.\n Cloudwatch: Fix annotation query serialization issue.\n Dashboard: Fix issue where unsaved changes warning would appear\n even after save, and not being able to change library\n panels.\n Dashboard: Hide overflow content for single left pane.\n Loki: Fix a bug where adding adhoc filters was not possible.\n- Update to 9.1.4\n GrafanaUI: Fixes Chrome issue for various query fields.\n- Update to 9.1.3\n API: Do not expose user input in datasource error responses.\n Library Panel: Allow to delete them when deprecated.\n Plugins Catalog: Allow to filter plugins using special\n characters.\n Alerting: Fix UI bug when setting custom notification\n policy group by.\n AppRootPage: Fix issue navigating between two app plugin pages.\n Correlations: Use correct fallback handlers.\n RBAC: Fix deleting empty snapshots.\n LibraryElements: Fix inability to delete library panels\n under MySQL.\n Metrics: fix `grafana_database_conn_*` metrics, and add\n new `go_sql_stats_*` metrics as eventual replacement.\n TestData DB: Fix node graph not showing when the `Data type`\n field is set to `random`.\n * Deprecations\n The `grafana_database_conn_*` metrics are deprecated, and will\n be removed in a future version of Grafana. Use the\n `go_sql_stats_*` metrics instead.\n- Update to 9.1.2\n AdHoc variable: Correctly preselect datasource when provisioning.\n AzureMonitor: Added ARG query function for template variables.\n Dashboards: Persist details message when navigating through\n dashboard save drawer\u0027s tabs.\n Dashboards: Correctly migrate mixed data source targets.\n Elasticsearch: Use millisecond intervals for alerting.\n Elasticsearch: Use millisecond intervals in frontend.\n Geomap: Local color range.\n Plugins Catalog: Use appSubUrl to generate plugins catalog urls.\n Rendering: Add support for renderer token.\n Alerting: Fix saving of screenshots uploaded with a signed url.\n AngularPanels: Fixing changing angular panel options not taking\n having affect when coming back from panel edit.\n Explore: Improve a11y of query row collapse button.\n Geomap: Fix tooltip display.\n QueryEditorRow: Filter data on mount.\n Search: Show all dashboards in the folder view.\n Tracing: Fix the event attributes in opentelemetry tracing.\n GrafanaUI: Fix styles for invalid selects \u0026 DataSourcePicker.\n- Update to 9.1.1\n Cloud Monitoring: Support SLO burn rate.\n Schema: Restore \u0027hidden\u0027 in LegendDisplayMode.\n Timeseries: Revert the timezone(s) property name change back to\n singular.\n Alerting: Fix links in Microsoft Teams notifications.\n Alerting: Fix notifications for Microsoft Teams.\n Alerting: Fix width of Adaptive Cards in Teams notifications.\n ColorPickerInput: Fix popover in disabled state.\n Decimals: Fixes auto decimals to behave the same for\n positive and negative values.\n Loki: Fix unique log row id generation.\n Plugins: Fix file extension in development authentication guide.\n TimeSeries: Fix jumping legend issue.\n TimeSeries: Fix memory leak on viz re-init caused by\n KeyboardPlugin.\n TimePicker: Fixes relative timerange of less than a day not\n displaying.\n GrafanaUI: Fixes ClipboardButton to always keep multi line\n content.\n- Update to 9.1.0\n API: Allow creating teams with a user defined identifier.\n Alerting: Adds interval and For to alert rule details.\n Alerting: Extend PUT rule-group route to write the entire\n rule group rather than top-level fields only.\n Alerting: Use Adaptive Cards in Teams notifications.\n Azure Monitor: Add Network Insights Dashboard.\n Chore: Improve logging of unrecoverable errors.\n Correlations: Add UpdateCorrelation HTTP API.\n Dashboard: Reverted the changes of hiding multi-select\n and all variable in the datasource picker.\n Geomap: Add alpha day/night layer.\n Geomap: Add measuring tools.\n GrafanaUI: Add success state to ClipboardButton.\n Heatmap: Replace the heatmap panel with new implementation.\n KVStore: Allow empty value in kv_store.\n Prometheus: Promote Azure auth flag to configuration.\n Search: Display only dashboards in General folder of\n Search Folder View.\n Status history/State timeline: Support datalinks.\n Transform: Add a limit transform.\n Transformations: Add standard deviation and variance reducers.\n API: Fix snapshot responses.\n Access Control: Fix permission error during dashboard\n creation flow.\n Access Control: Set permissions for Grafana\u0027s test data source.\n Alerting: Fix migration failure.\n BarGauge: Show empty bar when value, minValue and\n maxValue are all equal.\n Dashboard: Fix color of bold and italics text in panel\n description tooltip.\n Loki: Fix passing of query with defaults to code mode.\n Loki: Fix producing correct log volume query for query\n with comments.\n Loki: Fix showing of unusable labels field in detected fields.\n Tracing: Fix OpenTelemetry Jaeger context propagation.\n Alerting: AlertingProxy to elevate permissions for request\n forwarded to data proxy when RBAC enabled.\n Plugins: Only pass `rootUrls` field in request when not empty.\n Alert notifications to Microsoft Teams now use Adaptive Cards\n instead of Office 365 Connector Cards.\n Starting at 9.1.0, existing heatmap panels will start using a\n new implementation. This can be disabled by setting the\n `useLegacyHeatmapPanel` feature flag to true. It can be\n tested on a single dashbobard by adding\n `?__feature.useLegacyHeatmapPanel=true` to any dashboard URL.\n The most notable changes are:\n Significantly improved rendering performance\n When calculating heatmaps, the buckets are now placed on\n reasonable borders (1m, 5m, 30s etc)\n Round cells are no longer supported\n- Update to 9.0.9\n AuthNZ: Security fixes for CVE-2022-35957 and CVE-2022-36062.\n- Update to 9.0.8\n Alerting: Hide \u0027no rules\u0027 message when we are fetching\n from data sources.\n Alerting: AlertingProxy to elevate permissions for\n request forwarded to data proxy when RBAC enabled.\n- Update to 9.0.7\n CloudMonitoring: Remove link setting for SLO queries.\n GrafanaUI: Render PageToolbar\u0027s leftItems regardless of\n title\u0027s presence.\n- Update to 9.0.6\n Access Control: Allow org admins to invite new users to\n their organization.\n Grafana/toolkit: Fix incorrect image and font generation\n for plugin builds.\n Prometheus: Fix adding of multiple values for regex operator.\n UI/Card: Fix card items always having pointer cursor.\n- Update to 9.0.5\n Access control: Show dashboard settings to users who can\n edit dashboard.\n Alerting: Allow the webhook notifier to support a custom\n Authorization header.\n Plugins: Add signature wildcard globbing for dedicated\n private plugin type.\n Prometheus: Don\u0027t show errors from unsuccessful API\n checks like rules or exemplar checks.\n Access control: Allow organisation admins to add existing\n users to org.\n Alerting: Fix alert panel instance-based rules filtering.\n Apps: Fixes navigation between different app plugin pages.\n Cloudwatch: Upgrade grafana-aws-sdk to fix auth issue\n with secret keys.\n Loki: Fix `show context` not working in some occasions.\n RBAC: Fix permissions on dashboards and folders created\n by anonymous users.\n- Update to 9.0.4\n Browse/Search: Make browser back work properly when\n visiting Browse or search.\n Logs: Improve getLogRowContext API.\n Loki: Improve handling of empty responses.\n Plugins: Always validate root URL if specified in\n signature manfiest.\n Preferences: Get home dashboard from teams.\n SQLStore: Support Upserting multiple rows.\n Traces: Add more template variables in Tempo \u0026 Zipkin.\n Traces: Remove serviceMap feature flag.\n Access Control: Fix missing folder permissions.\n Access control: Fix org user removal for OSS users.\n Alerting: Fix Slack notifications.\n Alerting: Preserve new-lines from custom email templates\n in rendered email.\n Log: Fix text logging for unsupported types.\n Loki: Fix incorrect TopK value type in query builder.\n- Update to 9.0.3\n Access Control: Allow dashboard admins to query org users.\n Alerting: Add method to provisioning API for obtaining a\n group and its rules.\n Alerting: Allow filtering of contact points by name.\n Alerting: Disable /api/admin/pause-all-alerts with\n Unified Alerting.\n Annotations: Use point marker for short time range annotations.\n AzureMonitor: Update UI to experimental package.\n AzureMonitor: Update resource and namespace metadata.\n CloudWatch: Remove simplejson in favor of \u0027encoding/json\u0027.\n DashboardRow: Collapse shortcut prevent to move the\n collapsed rows.\n Navigation: Highlight active nav item when Grafana is\n served from subpath.\n Plugins: InfluxDB datasource - set epoch query param\n value as \u0027ms\u0027.\n Plugins: InfluxDB update time range query.\n StateTimeline: Try to sort time field.\n API: Do not validate/save legacy alerts when saving a\n dashboard if legacy alerting is disabled.\n Alerting: Add method to reset notification policy tree\n back to the default.\n Alerting: Fix Teams notifier not failing on 200 response\n with error.\n Alerting: Fix bug where state did not change between\n Alerting and Error.\n Alerting: Fix consistency errors in OpenAPI documentation.\n Alerting: Fix normalization of alert states for panel\n Alerting: Provisioning API respects global rule quota.\n CSRF: Fix additional headers option.\n Chore: Bump parse-url to 6.0.2 to fix security vulnerabilities.\n Chore: Fix CVE-2020-7753.\n Chore: Fix CVE-2021-3807.\n Chore: Fix CVE-2021-3918.\n Chore: Fix CVE-2021-43138.\n Chore: Fix CVE-2022-0155.\n Dashboard: Fixes tooltip issue with TimePicker and Setting buttons.\n Dashboard: Prevent unnecessary scrollbar when viewing\n single panel.\n Logs: Fixed wrapping log lines from detected fields.\n Loki: Add missing operators in label filter expression.\n Loki: Fix error when changing operations with different parameters.\n Loki: Fix suggesting of correct operations in query builder.\n Plugins: InfluxDB variable interpolation fix for\n influxdbBackendMigration feature flag.\n SQLstore: Fix fetching an inexistent playlist.\n Security: Fixes for CVE-2022-31107 and CVE-2022-31097.\n Snapshots: Fix deleting external snapshots when using RBAC.\n Table: Fix scrollbar being hidden by pagination.\n Templating: Changing between variables with the same name\n now correctly triggers a dashboard refresh.\n Time series panel: Fix an issue with stacks being not complete\n due to the incorrect data frame length.\n- Update to 9.0.2\n Alerting: Add support for images in Pushover alerts.\n Alerting: Don\u0027t stop the migration when alert rule tags\n are invalid.\n Alerting: Skip the default data source if incompatible.\n AzureMonitor: Parse non-fatal errors for Logs.\n OAuth: Restore debug log behavior.\n Plugins: Improved handling of symlinks.\n Alerting: Code-gen parsing of URL parameters and fix\n related bugs.\n Annotations: Fix annotation autocomplete causing panels\n to crash.\n Barchart: Fix warning not showing.\n CloudWatch: Enable custom session duration in AWS plugin auth.\n Dashboards: Fixes issue with the initial panel layout\n counting as an unsaved change.\n Plugins: Use a Grafana specific SDK logger implementation\n for core plugins.\n Search: Fix pagination in the new search page.\n- Update to 9.0.1\n Alerting: Add support for image annotation in\n Alertmanager alerts.\n Alerting: Add support for images in SensuGo alerts.\n Alerting: Add support for images in Threema alerts.\n Alerting: Adds Mimir to Alertmanager data source implementation.\n Alerting: Invalid setting of enabled for unified alerting\n should return error.\n AzureMonitor: Clean namespace when changing the resource.\n AzureMonitor: Update supported namespaces and filter\n resources by the right type.\n CLI: Allow relative symlinks in zip archives when\n installing plugins.\n Dashboard: Don\u0027t show unsaved changes modal for automatic\n schema changes.\n Dashboard: Unsaved changes warning should not trigger\n when only pluginVersion has changed.\n Expression: Execute hidden expressions.\n Geomap: Support showing tooltip content on click (not\n just hover).\n Heatmap: Remove alpha flag from new heatmap panel.\n Instrumentation: Define handlers for requests that are\n not handled with named handlers.\n Log Panel: Improve log row hover contrast and visibility.\n Logs: Handle backend-mode errors in histogram.\n Loki: Do not show histogram for instant queries.\n Loki: Handle data source configs with path in the url.\n Loki: Handle invalid query type values.\n OAuth: Redirect to login if no oauth module is found or\n if module is not configured.\n OptionsUI: Move internal options editors out of @grafana/ui.\n Prometheus: Don\u0027t show undefined for step in collapsed\n options in query editor when value is \u0027auto\u0027.\n Prometheus: Show query patterns in all editor modes for\n Prometheus and Loki.\n Tempo: Add link to Tempo Search with node service selected.\n Time Series Panel: Add Null Filling and \u0027No Value\u0027 Support.\n TimeSeries: Add an option to set legend width.\n Timeseries: Improve cursor Y sync behavior.\n Traces: Do not use red in span colors as this looks like\n an error.\n Alerting: Fix AM config overwrite when SQLite db is\n locked during sync.\n Alerting: Fix alert instances filtering for prom rules.\n Alerting: Fix alert rule page crashing when datasource\n contained URL unsafe characters.\n Alerting: Fix automatically select newly created folder option.\n Alerting: Fix removal of notification policy without\n labels matchers.\n CloudWatch: Allow hidden queries to be executed in case\n an ID is provided.\n Dashboard: Prevent non-repeating panels being dropped\n from repeated rows when collapsed/expanded.\n Dashboards: Fix folder picker not showing correct results\n when typing too fast.\n Datasource: Prevent panic when proxying for non-existing\n data source.\n Explore: Fix log context scroll to bottom.\n Explore: Revert \u0027Remove support for compact format URLs\u0027.\n Expressions: Fixes dashboard schema migration issue that casued\n Expression datasource to be set on panel level.\n Formatting: Fixes valueFormats for a value of 0.\n GrafanaData: Fix week start for non-English browsers.\n LibraryPanel: Resizing a library panel to 6x3 no longer\n crashes the dashboard on startup.\n LogRow: Fix placement of icon.\n Loki: Fix bug in labels framing.\n Loki: Fix issues with using query patterns.\n Loki: Fix showing of duplicated label values in dropdown\n in query builder.\n MSSQL: Fix ParseFloat error.\n Panels: Fixes issue with showing \u0027Cannot visualize data\u0027\n when query returned 0 rows.\n Playlists: Disable Create Playlist buttons for users with\n viewer role.\n Plugins: Fix typo in plugin data frames documentation.\n Prometheus: Fix body not being included in resource calls\n if they are POST.\n RolePicker: Fix submenu position on horizontal space overflow.\n Tracing: Fix trace links in traces panel.\n Support for compact Explore URLs is deprecated and will be\n removed in a future release. Until then, when navigating to\n Explore using the deprecated format the URLs are\n automatically converted. If you have existing links pointing\n to Explore update them using the format generated by Explore\n upon navigation. You can identify a compact URL by its\n format. Compact URLs have the left (and optionally right) url\n parameter as an array of strings, for example\n `\u0026left=[\u0027now-1h\u0027,\u0027now\u0027...]`. The standard explore URLs follow\n a key/value pattern, for example\n `\u0026left={\u0027datasource\u0027:\u0027test\u0027...}`. Please be sure to check\n your dashboards for any hardcoded links to Explore and update\n them to the standard URL pattern.\n- Update to 9.0.0\n API: Add GET /api/annotations/:annotationId endpoint.\n API: Add endpoint for updating a data source by its UID.\n AccessControl: Add enterprise only setting for rbac\n permission cache.\n AccessControl: Document basic roles changes and provisioning V2.\n AccessControl: Enable RBAC by default.\n AddDataSourceConfig: Remove deprecated checkHealth prop.\n Alerting: Add Image URLs to Microsoft Teams notifier.\n Alerting: Add RBAC actions and role for provisioning API routes.\n Alerting: Add Screenshot URLs to Pagerduty Notifier.\n Alerting: Add a \u0027Reason\u0027 to Alert Instances to show\n underlying cause of state.\n Alerting: Add a general screenshot service and\n alerting-specific image service.\n Alerting: Add image url or file attachment to email\n notifications.\n Alerting: Add image_urls to OpsGenie notification details.\n Alerting: Add notification policy flow chart.\n Alerting: Attach image URL to alerts in Webhook notifier format.\n Alerting: Attach image URLs or upload files to Discord\n Alerting: Attach image URLs to Google Chat notifications.\n Alerting: Attach screenshot data to Unified Alerting\n Alerting: Create folder for alerting when start from the\n scratch.\n Alerting: Modify alertmanager endpoints for proxying\n using the datasource UID.\n Alerting: Modify endpoint for testing a datasource rule\n using the UID.\n Alerting: Modify prometheus endpoints for proxying using\n the datasource UID.\n Alerting: State Manager takes screenshots.\n Alerting: Use UID scope for folders authorization.\n Alerting: modify ruler endpoints for proxying using the\n datasource UID.\n Angular: Adds back two angular directives that are still\n used by remaining angular bits and plugins.\n Azure Monitor: Add Resource Picker to Metrics Queries.\n Azure Monitor: Add search feature to resource picker.\n AzureMonitor: Add support for selecting multiple options when\n using the equals and not equals dimension filters.\n AzureMonitor: Remove deprecated code.\n Build: Change names to PascalCase to match.\n Chore: Remove deprecated DataSourceAPI methods.\n Chore: Upgrade typescript to 4.6.4.\n Cloud Monitoring: Use new annotation API.\n CloudMonitoring: Allow to set a custom value or disable\n graph_period.\n CloudWatch: Add generic filter component to variable editor.\n CloudWatch: Added missing AWS/AppRunner metrics.\n CloudWatch: Enable support for dynamic labels with\n migrated alias patterns.\n Cloudwatch: Pass label in deep link.\n Cloudwatch: Use new annotation API.\n Dashboard: Validate dashboards against schema on save.\n DashboardPickerByID: Add option to exclude dashboards.\n DashboardPickerById: Add optionLabel prop.\n Dashboards: Display values of 0 with the configured\n decimal places.\n Data: Remove deprecated types and functions from valueMappings.\n Elasticsearch: Remove browser access mode.\n Elasticsearch: Remove support for versions after their\n end of the life (\u003c7.10.0).\n Encryption: Add support for multiple data keys per day.\n Encryption: Enable envelope encryption by default.\n Explore: Remove support for legacy, compact format URLs.\n Explore: Skip Angular error handling when Angular support\n is disabled.\n Explore: simplify support for multiple query editors.\n FeatureToggles: Support changing feature toggles with URL\n parameters.\n FileUpload: Make component accessible by keyboard navigation.\n Formatting: Make SI number formats more robust.\n Graph: Deprecate Graph (old) and make it no longer a\n visualization option for new panels.\n IconButton: IconButtons are now correctly aligned in Safari.\n Logger: Enable new logging format by default.\n Loki: Add more query patterns.\n Loki: Enable new visual query builder by default.\n Loki: use the same dataframe-format for both live and\n normal queries.\n OAuth: Make allowed email domain case insensitive.\n Panels: Use the No value option when showing the no data\n message.\n Plugins: Remove plugin list panel.\n Query History: Enable new query history by default.\n QueryEditorRow: Show query errors next to query in a\n consistent way across Grafana.\n SAML: Implement Name Templates for\n assertion_attribute_name option.\n Service accounts: Do not display service accounts\n assigned to team.\n Settings: Use Grafana Azure SDK to pass Azure env vars\n for external plugins.\n Shortcuts: Add shortcut to show shortcuts to the list of\n shortcuts.\n Traces Panel: Add new Traces Panel visualization.\n Traces: Filter by service/span name and operation in\n Tempo and Jaeger.\n Transformations: Allow more complex regex expressions\n in `Rename by regex`.\n grafana/ui: Add default type=\u0027button\u0027 to \u003cButton\u003e.\n Alerting: Fix database unavailable removes rules from scheduler.\n AzureMonitor: Fix auto-selection of time-grain for metrics.\n DataSources: Fixes issue with expressions not being queried.\n GraphNG: Fix thresholds by color not following data update.\n Jaeger: Update operations dropdown.\n Login: Fix mismatching label on auth_module in user list.\n Playlists: Save button now correctly creates a new playlist.\n RBAC: Fix migrations running in the wrong order causing\n inheritance problem in enterprise.\n ServiceAccounts: Add identifiable token prefix to service\n account tokens.\n Traces: Fix missing CopyButton on KeyValueTables and\n overlapping of panels.\n `setExploreQueryField`, `setExploreMetricsQueryField` and\n `setExploreLogsQueryField` are now deprecated and will be\n removed in a future release. If you need to set a different\n query editor for Explore, conditionally render based on\n `props.app` in your regular query editor.\n Chore: Remove react-testing-lib from bundles.\n Select: Portal menu by default.\n The `@grafana/ui` package helper function\n `selectOptionInTest` used in frontend tests has been removed\n as it caused testing libraries to be bundled in the\n production code of Grafana. If you were using this helper\n function in your tests please update your code accordingly:\n ```js\n // before\n import { selectOptionInTest } from \u0027@grafana/ui\u0027;\n // ...test usage\n await selectOptionInTest(selectEl, \u0027Option 2\u0027);\n // after\n import { select } from \u0027react-select-event\u0027;\n await select(selectEl, \u0027Option 2\u0027,\n { container: document.body });\n ```\n Removed deprecated `checkHealth` prop from the `@grafana/e2e`\n `addDataSource` config. Previously this value defaulted to\n `false`, and has not been used in end-to-end tests since\n Grafana 8.0.3.\n Removes the deprecated `LegacyBaseMap`, `LegacyValueMapping`,\n `LegacyValueMap`, and `LegacyRangeMap` types, and\n `getMappedValue` function from grafana-data. Migration is as\n follows:\n | Old | New |\n | -------------------- | ----------------------- |\n | `LegacyBaseMap` | `MappingType` |\n | `LegacyValueMapping` | `ValueMapping` |\n | `LegacyValueMap` | `ValueMap` |\n | `LegacyRangeMap` | `RangeMap` |\n | `getMappedValue` | `getValueMappingResult` |\n This change fixes a bug in Grafana where intermittent failure\n of database, network between Grafana and the database, or\n error in querying the database would cause all alert rules to\n be unscheduled in Grafana. Following this change scheduled\n alert rules are not updated unless the query is successful.\n The `get_alert_rules_duration_seconds` metric has been\n renamed to `schedule_query_alert_rules_duration_seconds`.\n Any secret (data sources credential, alert manager\n credential, etc, etc) created or modified with Grafana v9.0\n won\u0027t be decryptable from any previous version (by default)\n because the way encrypted secrets are stored into the\n database has changed. Although secrets created or modified\n with previous versions will still be decryptable by Grafana\n v9.0.\n If required, although generally discouraged, the\n `disableEnvelopeEncryption` feature toggle can be enabled to\n keep envelope encryption disabled once updating to Grafana\n In case of need to rollback to an earlier version of Grafana\n (i.e. Grafana v8.x) for any reason, after being created or\n modified any secret with Grafana v9.0, the\n `envelopeEncryption` feature toggle will need to be enabled\n to keep backwards compatibility (only from `v8.3.x` a bit\n unstable, from `8.5.x` stable).\n As a final attempt to deal with issues related with the\n aforementioned situations, the `grafana-cli admin\n secrets-migration rollback` command has been designed to\n move back all the Grafana secrets encrypted with envelope\n encryption to legacy encryption. So, after running that\n command it should be safe to disable envelope encryption\n and/or roll back to a previous version of Grafana.\n Alternatively or complementarily to all the points above,\n backing up the Grafana database before updating could be a\n good idea to prevent disasters (although the risk of getting\n some secrets corrupted only applies to those updates/created\n with after updating to Grafana v9.0).\n According to the dynamic labels documentation, you can use up\n to five dynamic values per label. There\u2019s currently no such\n restriction in the alias pattern system, so if more than 5\n patterns are being used the GetMetricData API will return an\n error.\n Dynamic labels only allow \\${LABEL} to be used once per\n query. There\u2019s no such restriction in the alias pattern\n system, so in case more than 1 is being used the\n GetMetricData API will return an error.\n When no alias is provided by the user, Grafana will no longer\n fallback with custom rules for naming the legend.\n In case a search expression is being used and no data is\n returned, Grafana will no longer expand dimension values, for\n instance when using a multi-valued template variable or star\n wildcard `*` in the dimension value field.\n Time series might be displayed in a different order. Using\n for example the dynamic label `${PROP(\u0027MetricName\u0027)}`, might\n have the consequence that the time series are returned in a\n different order compared to when the alias pattern\n `{{metric}}` is used\n In Elasticsearch, browser access mode was deprecated in\n grafana 7.4.0 and removed in 9.0.0. If you used this mode,\n please switch to server access mode on the datasource\n configuration page.\n Environment variables passed from Grafana to external Azure\n plugins have been renamed:\n `AZURE_CLOUD` renamed to `GFAZPL_AZURE_CLOUD`\n `AZURE_MANAGED_IDENTITY_ENABLED` renamed to\n `GFAZPL_MANAGED_IDENTITY_ENABLED`\n `AZURE_MANAGED_IDENTITY_CLIENT_ID` renamed to\n `GFAZPL_MANAGED_IDENTITY_CLIENT_ID`\n There are no known plugins which were relying on these\n variables. Moving forward plugins should read Azure settings\n only via Grafana Azure SDK which properly handles old and new\n environment variables.\n Removes support for for ElasticSearch versions after their\n end-of-life, currently versions \u003c 7.10.0. To continue to use\n ElasticSearch data source, upgrade ElasticSearch to version\n 7.10.0+.\n Application Insights and Insight Analytics queries in Azure\n Monitor were deprecated in Grafana 8.0 and finally removed in\n 9.0. Deprecated queries will no longer be executed.\n grafana/ui: Button now specifies a default type=\u0027button\u0027\n The `Button` component provided by @grafana/ui now specifies\n a default `type=\u0027button\u0027` when no type is provided.\n In previous versions, if the attribute was not specified for\n buttons associated with a `\u003cform\u003e` the default value was\n `submit` per the specification. You can preserve the old\n behavior by explicitly setting the type attribute:\n `\u003cButton type=\u0027submit\u0027 /\u003e`\n The `Rename by regex` transformation has been improved to\n allow global patterns of the form `/\u003cstringToReplace\u003e/g`.\n Depending on the regex match used, this may cause some\n transformations to behave slightly differently. You can\n guarantee the same behaviour as before by wrapping the\n `match` string in forward slashes (`/`), e.g. `(.*)` would\n become `/(.*)/`\n `\u003cSelect /\u003e` menus will now portal to the document body by\n default. This is to give more consistent behaviour when\n positioning and overlaying. If you were setting\n `menuShouldPortal={true}` before you can safely remove that\n prop and behaviour will be the same. If you weren\u0027t\n explicitly setting that prop, there should be no visible\n changes in behaviour but your tests may need updating. If you\n were setting `menuShouldPortal={false}` this will continue to\n prevent the menu from portalling.\n Grafana alerting endpoint prefixed with `api/v1/rule/test`\n that tests a rule against a Corte/Loki data source now\n expects the data source UID as a path parameter instead of\n the data source numeric identifier.\n Grafana alerting endpoints prefixed with `api/prometheus/`\n that proxy requests to a Cortex/Loki data source now expect\n the data source UID as a path parameter instead of the data\n source numeric identifier.\n Grafana alerting endpoints prefixed with `api/ruler/` that\n proxy requests to a Cortex/Loki data source now expect the\n data source UID as a path parameter instead of the data\n Grafana alerting endpoints prefixed with `api/alertmanager/`\n that proxy requests to an Alertmanager now expect the data\n source UID as a path parameter instead of the data source\n numeric identifier.\n The format of log messages have been updated, `lvl` is now\n `level` and `eror`and `dbug` has been replaced with `error`\n and `debug`. The precision of timestamps has been increased.\n To smooth the transition, it is possible to opt-out of the\n new log format by enabling the feature toggle `oldlog`.\n This option will be removed in a future minor release.\n In the Loki data source, the dataframe format used to\n represent Loki logs-data has been changed to a more efficient\n format. The query-result is represented by a single dataframe\n with a \u0027labels\u0027 column, instead of the separate dataframes\n for every labels-value. When displaying such data in explore,\n or in a logs-panel in the dashboard will continue to work\n without changes, but if the data was loaded into a different\n dashboard-panel, or Transforms were used, adjustments may be\n necessary. For example, if you used the \u0027labels to fields\u0027\n transformation with the logs data, please switch to the\n \u0027extract fields\u0027 transformation.\n- Update to version 8.5.22:\n * Fix XSS in Graphite functions tooltip\n (bsc#1209645, CVE-2023-1410)\n- Update to version 8.5.21:\n * Apply attribute sanitation to GeomapPanel\n (bsc#1208821, CVE-2023-0507)\n * Avoid storing XSS in TraceView panel\n (bsc#1208819, CVE-2023-0594)\n * Login: Fix panic when UpsertUser is called without ReqContext \n- Fix basic authentication bypass by updating the exporter toolkit\n to version 0.7.3 (bsc#1208065, CVE-2022-46146).\n- Require Go 1.19 or newer (bsc#1208293, CVE-2022-41723)\n- Update to version 8.5.20:\n * Security: SVG: Add dompurify preprocessor step\n (bsc#1207749, CVE-2022-23552)\n * Security: Snapshots: Fix originalUrl spoof security issue\n (bsc#1207750, CVE-2022-39324)\n * Security: Omit error from http response \n * Bug fix: Email and username trimming and invitation validation\n- Update to version 8.5.15 (jsc#PED-2617):\n * Security: Fix for privilege escalation\n (bsc#1205225, CVE-2022-39306)\n * Security: Omit error from http response when user does not\n exists (bsc#1205227, CVE-2022-39307)\n- Update to version 8.5.14:\n * Security: Fix do not forward login cookie in outgoing requests\n (bsc#1204303, CVE-2022-39201)\n * Security: Make proxy endpoints not leak sensitive HTTP headers\n (bsc#1204305, CVE-2022-31130)\n * Security: Fix plugin signature bypass (bsc#1204302, CVE-2022-31123)\n * Security: Fix blocknig other users from signing in (bsc#1204304,\n CVE-2022-39229)\n- Update to version 8.5.13 (jsc#PED-2145):\n + Features and enhancements:\n * Plugins: Expose emotion/react to plugins to prevent load\n failures\n + Bug fix:\n * AuthNZ: Security fixes for (bsc#1203596, CVE-2022-36062) and\n (bsc#1203597, CVE-2022-35957)\n- Update to version 8.5.11:\n * Rendering: Add support for renderer token\n * Alerting: AlertingProxy to elevate permissions for request\n forwarded to data proxy when RBAC enabled\n- Update to version 8.5.10\n + Bug fixes (8.5.10):\n * RBAC: Fix Anonymous Editors missing dashboard controls.\n #52649, @gamab\n + Bug fixes (8.5.9):\n * Security: Fixes for CVE-2022-31107 and CVE-2022-31097.\n #52238, @xlson\n + Bug fixes (8.5.6):\n * Dashboard: Fixes random scrolling on time range change.\n #50379, @torkelo\n * Security: Fixes minor code scanning security warnings in old\n vendored javascript libs. #50382, @torkelo\n + Features and enhancements (8.5.5):\n * Azure Monitor: Include datasource ref when interpolating\n variables. #49543, @kevinwcyu\n * CloudWatch: Add multi-value template variable support for log\n group names in logs query builder. #49737, @kevinwcyu\n * Cloudwatch: Add template variable query function for listing\n log groups. #50100, @yaelleC\n + Bug fixes (8.5.5):\n * Alerting: Do not overwrite existing alert rule condition.\n #49920, @gillesdemey\n * Alerting: Remove double quotes from matchers. #50044,\n @alexweav\n + Features and enhancements (8.5.4):\n * Alerting: Remove disabled flag for data source when migrating\n alerts. #48559, @yuri-tceretian\n * Alerting: Show notification tab of legacy alerting only to\n editor. #49624, @yuri-tceretian\n * Alerting: Update migration to migrate only alerts that belong\n to existing org\\dashboard. #49192, @yuri-tceretian\n * AzureMonitor: Do not quote variables when a custom \u0027All\u0027\n variable option is used. #49428, @andresmgot\n * AzureMonitor: Update allowed namespaces. #48468,\n @jcolladokuri\n * CloudMonitor: Correctly encode default project response.\n #49510, @aangelisc\n * Cloudwatch: Add support for new AWS/RDS EBS* metrics.\n #48798, @szymonpk\n * InfluxDB: Use backend for influxDB by default via feature\n toggle. #48453, @yesoreyeram\n * Legend: Use correct unit for percent and count calculations.\n #49004, @dprokop\n * LokI: use millisecond steps in Grafana 8.5.x. #48630, @gabor\n * Plugins: Introduce HTTP 207 Multi Status response to\n api/ds/query. #48550, @wbrowne\n * Transformations: Add an All Unique Values Reducer. #48653,\n @josiahg\n * Transformers: avoid error when the ExtractFields source field\n is missing. #49368, @wardbekker\n * [v8.5.x] Alerting: Update migration to migrate only alerts\n that belong to existing org\\dashboard. #49199, @grafanabot\n + Bug fixes (8.5.4):\n * Alerting: Allow disabling override timings for notification\n policies. #48648, @gillesdemey\n * Alerting: Allow serving images from custom url path. #49022,\n @gillesdemey\n * Alerting: Apply Custom Headers to datasource queries. #47860,\n @joeblubaugh\n * Alerting: Fix RBAC actions for notification policies. #49185,\n @yuri-tceretian\n * Alerting: Fix access to alerts for viewer with editor\n permissions when RBAC is disabled. #49270, @yuri-tceretian\n * Alerting: Fix anonymous access to alerting. #49203,\n * Alerting: correctly show all alerts in a folder. #48684,\n * AzureMonitor: Fixes metric definition for Azure Storage\n queue/file/blob/table resources. #49101, @aangelisc\n * Dashboard: Fix dashboard update permission check. #48746,\n @IevaVasiljeva\n * DashboardExport: Fix exporting and importing dashboards where\n query data source ended up as incorrect. #48410, @torkelo\n * FileUpload: clicking the Upload file button now opens their\n modal correctly. #48766, @ashharrison90\n * GrafanaUI: Fix color of links in error Tooltips in light\n theme. #49327, @joshhunt\n * LibraryPanels: Fix library panels not connecting properly in\n imported dashboards. #49161, @joshhunt\n * Loki: Improve unpack parser handling. #49074, @gabor\n * RolePicker: Fix menu position on smaller screens. #48429,\n @Clarity-89\n * TimeRange: Fixes updating time range from url and browser\n history. #48657, @torkelo\n * TimeSeries: Fix detection \u0026 rendering of sparse datapoints.\n #48841, @leeoniya\n * Timeseries: Fix outside range stale state. #49633, @ryantxu\n * Tooltip: Fix links not legible in Tooltips when using light\n theme. #48748, @joshhunt\n * Tooltip: Sort decimals using standard numeric compare.\n #49084, @dprokop\n * Transforms: Labels to fields, fix label picker layout.\n #49304, @torkelo\n * Variables: Fixes issue with data source variables not\n updating queries with variable. #49478, @torkelo\n * [v8.5.x] Alerting: Fix RBAC actions for notification policies\n (#49185). #49348, @yuri-tceretian\n * [v8.5.x] Alerting: Fix access to alerts for viewer with\n editor permissions when RBAC is disabled. #49427, @konrad147\n * [v8.5.x] Alerting: Fix anonymous access to alerting. #49268,\n + Breaking changes (8.5.4):\n For a data source query made via /api/ds/query:\n If the DatasourceQueryMultiStatus feature is enabled and\n The data source response has an error set as part of the\n DataResponse, the resulting HTTP status code is now 207\n Multi Status instead of 400 Bad gateway\n If the DatasourceQueryMultiStatus feature is not enabled and\n DataResponse, the resulting HTTP status code is 400 Bad\n Request (no breaking change)\n --\u003e Issue #48550\n + Bug fixes (8.5.3):\n * Security: fixes CVE-2022-29170. #49240, @xlson\n + Features and enhancements (8.5.2):\n * Alerting: Add safeguard for migrations that might cause\n dataloss. #48526, @JohnnyQQQQ\n * AzureMonitor: Add support for not equals and startsWith\n operators when creating Azure Metrics dimension filters.\n #48077, @aangelisc\n * Elasticsearch: Add deprecation notice for \u003c 7.10 versions.\n #48506, @ivanahuckova\n * Traces: Filter by service/span name and operation in Tempo\n and Jaeger. #48209, @joey-grafana\n + Bug fixes (8.5.2):\n * AzureAd Oauth: Fix strictMode to reject users without an\n assigned role. #48474, @kyschouv\n * CloudWatch: Fix variable query tag migration. #48587, @iwysiu\n * Plugins: Ensure catching all appropriate 4xx api/ds/query\n scenarios. #47565, @wbrowne\n + Bug fixes (8.5.1):\n * Azure Monitor: Fix space character encoding for metrics query\n link to Azure Portal. #48139, @kevinwcyu\n * CloudWatch: Prevent log groups from being removed on query\n change. #47994, @asimpson\n * Cloudwatch: Fix template variables in variable queries.\n #48140, @iwysiu\n * Explore: Prevent direct access to explore if disabled via\n feature toggle. #47714, @Elfo404\n * InfluxDB: Fixes invalid no data alerts. #48295, @yesoreyeram\n * Navigation: Prevent navbar briefly showing on login. #47968,\n @ashharrison90\n * Plugins Catalog: Fix styling of hyperlinks. #48196, @marefr\n * Table: Fix filter crashes table. #48258, @zoltanbedi\n * TimeSeries: Properly stack series with missing datapoints.\n #48321, @leeoniya\n + Features and enhancements (8.5.0):\n * Alerting: Add contact points provisioning API. #47197,\n @JohnnyQQQQ\n * Alerting: Add resolved count to notification title when both\n firing and resolved present. #46697, @JacobsonMT\n * Alerting: Alert rule should wait For duration when execution\n error state is Alerting. #47052, @grobinson-grafana\n * Alerting: Classic conditions can now display multiple values.\n #46971, @gotjosh\n * Alerting: Display query from grafana-managed alert rules on\n /api/v1/rules. #45969, @gotjosh\n * Alerting: Enhance support for arbitrary group names in\n managed alerts. #47785, @gillesdemey\n * Alerting: add field for custom slack endpoint. #45751,\n @nathanrodman\n * Azure Monitor : Adding json formatting of error messages in\n Panel Header Corner and Inspect Error Tab. #44877, @yaelleC\n * Azure Monitor: Add 2 more Curated Dashboards for VM Insights.\n #45187, @jcolladokuri\n * CloudWatch: Handle new error codes for MetricInsights.\n #47033, @Gabrielopesantos\n * Dashboards: show changes in save dialog. #46557, @ryantxu\n * DataSource: Default data source is no longer a persisted\n state but just the default data source for new panels.\n #45132, @torkelo\n * DataSourcePlugin API: Allow queries import when changing data\n source type. #47435, @dprokop\n * Explore: Remove return to panel button. #45018, @gelicia\n * Explore: allow users to save Explore state to a new panel in\n a new dashboard. #45148, @Elfo404\n * Instrumentation: Proxy status code correction and various\n improvements. #47473, @marefr\n * Logging: Introduce feature toggle to activate gokit/log\n format. #47336, @ying-jeanne\n * NewsPanel: Add support for Atom feeds. #45390, @kaydelaney\n * Plugins: Add deprecation notice for /api/tsdb/query endpoint.\n #45238, @wbrowne\n * Plugins: Adding support for traceID field to accept\n variables. #45559, @vinisdl\n * PostgreSQL: __unixEpochGroup to support arithmetic expression\n as argument. #46764, @s0nik42\n * Profile/Help: Expose option to disable profile section and\n help menu. #46308, @cameronwaterman\n * Prometheus: Enable new visual query builder by default.\n #46634, @torkelo\n * SAML: Allow disabling of SAML signups. #47481, @mmandrus\n * SAML: Allow disabling of SAML signups. (Enterprise)\n * Table: New pagination option. #45732, @zoltanbedi\n * TablePanel: Add cell inspect option. #45620, @dprokop\n * Tempo / Trace Viewer: Support Span Links in Trace Viewer.\n #45632, @Shachi16\n * Tempo: Download span references in data inspector. #47074,\n @connorlindsey\n * Tempo: Separate trace to logs and loki search datasource\n config. #46655, @connorlindsey\n * Trace View: Show number of child spans. #44393, @tharun208\n * Transformations: Support escaped characters in key-value pair\n parsing. #47901, @aangelisc\n + Bug fixes (8.5.0):\n * Azure Monitor: Bug Fix for incorrect variable cascading for\n template variables. #47478, @jcolladokuri\n * CloudWatch: List all metrics properly in SQL autocomplete.\n #45898, @sunker\n * CloudWatch: Run query on blur in logs query field. #47454,\n @fridgepoet\n * Dashboard: Template variables are now correctly persisted\n when clicking breadcrumb links. #46790, @ashharrison90\n * DashboardPage: Remember scroll position when coming back\n panel edit / view panel. #47639, @torkelo\n * Panel Edit: Options search now works correctly when a\n logarithmic scale option is set. #47927, @ashharrison90\n * Postgres: Return tables with hyphenated schemes. #45754,\n @zuchka\n * Table panel: Fix horizontal scrolling when pagination is\n enabled. #47776, @dprokop\n * Variables: Ensure variables in query params are correctly\n recognised. #47049, @ashharrison90\n * Variables: Fix crash when changing query variable datasource.\n #44957, @joshhunt\n * Visualizations: Stack negative-valued series downwards.\n #47373, @leeoniya\n + Breaking changes (8.5.0):\n For a proxied request, e.g. Grafana\u0027s datasource or plugin\n proxy: If the request is cancelled, e.g. from the browser/by\n the client, the HTTP status code is now 499 Client closed\n request instead of 502 Bad gateway If the request times out,\n e.g. takes longer time than allowed, the HTTP status code is\n now 504 Gateway timeout instead of 502 Bad gateway. Issue\n #47473 The change in behavior is that negative-valued series\n are now stacked downwards from 0 (in their own stacks), rather\n than downwards from the top of the positive stacks. We now\n automatically group stacks by Draw style, Line interpolation,\n and Bar alignment, making it impossible to stack bars on top of\n lines, or smooth lines on top of stepped lines. Issue #47373\n The meaning of the default data source has now changed from\n being a persisted property in a panel. Before when you selected\n the default data source for a panel and later changed the\n default data source to another data source it would change all\n panels who were configured to use the default data source. From\n now on the default data source is just the default for new\n panels and changing the default will not impact any currently\n saved dashboards. Issue #45132 The Tooltip component provided\n by @grafana/ui is no longer automatically interactive (that is\n you can hover onto it and click a link or select text). It will\n from now on by default close automatically when you mouse out\n from the trigger element. To make tooltips behave like before\n set the new interactive property to true.\n + Deprecations (8.5.0):\n /api/tsdb/query API has been deprecated and will be removed in\n a future release. Use /api/ds/query instead. Issue #45238\n + Plugin development fixes \u0026 changes (8.5.0):\n * Card: Increase clickable area when meta items are present.\n #47935, @ashharrison90\n * Loki: Fix operator description propup from being shortened.\n #46575, @glintik\n * Tooltips: Make tooltips non interactive by default. #45053,\n @torkelo\n + Features and enhancements (8.4.7):\n * CloudWatch: Added missing MemoryDB Namespace metrics. #47290,\n @james-deee\n * Histogram Panel: Take decimal into consideration. #47330,\n @mdvictor\n * TimeSeries: Sort tooltip values based on raw values. #46738,\n @dprokop\n + Bug fixes (8.4.7):\n * API: Include userId, orgId, uname in request logging\n middleware. #47183, @marefr\n * Elasticsearch: Respect maxConcurrentShardRequests datasource\n setting. #47120, @alexandrst88\n + Features and enhancements (8.4.5):\n * Instrumentation: Make backend plugin metrics endpoints\n available with optional authentication. #46467, @marefr\n * Table panel: Show datalinks for cell display modes JSON View\n and Gauge derivates. #46020, @mdvictor\n + Bug fixes (8.4.5):\n * Azure Monitor: Small bug fixes for Resource Picker. #46665,\n @sarahzinger\n * Logger: Use specified format for file logger. #46970, @sakjur\n * Logs: Handle missing fields in dataframes better. #46963,\n @gabor\n * ManageDashboards: Fix error when deleting all dashboards from\n folder view. #46877, @joshhunt\n + Features and enhancements (8.4.4):\n * Loki: Add unpack to autocomplete suggestions (#44623).\n #46573, @glintik\n * Plugins: allow using both Function and Class components for\n app plugins. #46148, @leventebalogh\n * TimeSeries: Add migration for Graph panel\u0027s transform series\n override. #46577, @dprokop\n * TimeSeries: Preserve null/undefined values when performing\n negative y transform. #46584, @dprokop\n + Bug fixes (8.4.4):\n * CloudWatch: Use default http client from aws-sdk-go. #46370,\n @sunker\n * Dashboards: Fixes repeating by row and no refresh. #46565,\n * Gauge: Fixes blank viz when data link exists and orientation\n was horizontal. #46335, @torkelo\n * Search: sort results correctly when using postgres. #46466,\n @xlson\n * TagsInput: fix tags remove button accessibility issues.\n #46254, @Elfo404\n * TextPanel: Sanitize after markdown has been rendered to html.\n #46166, @ashharrison90\n + Features and enhancements (8.4.3):\n * Alerting: Grafana uses \u003e instead of \u003e= when checking the For\n duration. #46010\n * Alerting: Use expanded labels in dashboard annotations.\n #45726, @grobinson-grafana\n * Logs: Escape windows newline into single newline. #45771,\n @perosb\n + Bug fixes (8.4.3):\n * Alerting: Fix use of \u003e instead of \u003e= when checking the For\n duration. #46011, @grobinson-grafana\n * Azure Monitor: Fixes broken log queries that use workspace.\n #45820, @sunker\n * CloudWatch: Remove error message when using multi-valued\n template vars in region field. #45886, @sunker\n * Middleware: Fix IPv6 host parsing in CSRF check. #45911,\n @ying-jeanne\n + Plugin development fixes \u0026 changes (8.4.3):\n * ClipboardButton: Use a fallback when the Clipboard API is\n unavailable. #45831, @ashharrison90\n + Features and enhancements (8.4.2):\n * OAuth: Add setting to skip org assignment for external\n users. #34834, @baez90\n * Tracing: Add option to map tag names to log label names in\n trace to logs settings. #45178, @connorlindsey\n + Bug fixes (8.4.2):\n * Explore: Fix closing split pane when logs panel is\n used. #45602, @ifrost\n + Features and enhancements (8.4.1):\n * Cloudwatch: Add support for AWS/PrivateLink* metrics and\n dimensions. #45515, @szymonpk\n * Configuration: Add ability to customize okta login button\n name and icon. #44079, @DanCech\n * Tempo: Switch out Select with AsyncSelect component to get\n loading state in Tempo Search. #45110, @CatPerry\n + Bug fixes (8.4.1):\n * Alerting: Fix migrations by making send_alerts_to field\n nullable. #45572, @santihernandezc\n + Features and enhancements (8.4.0):\n * API: Extract OpenAPI specification from source code using\n go-swagger. #40528, @papagian\n * AccessControl: Disable user remove and user update roles when\n they do not have the permissions. #43429, @Jguer\n * AccessControl: Provisioning for teams. #43767, @gamab\n * API: Add usage stats preview endpoint. #43899, @Jguer\n * Alerting: Move slow queries in the scheduler to another\n goroutine. #44423, @grobinson-grafana\n * Alerting: Use time.Ticker instead of alerting.Ticker in\n ngalert. #44395, @grobinson-grafana\n * Alerting: add custom grouping to Alert Panel. #44559,\n * Analytics: Add user id tracking to google analytics.\n #42763, @autoric\n * Angular: Add AngularJS plugin support deprecation plan to\n docs site. #45149, @torkelo\n * Auth: implement auto_sign_up for auth.jwt. #43502, @sakjur\n * Azure Monitor Logs: Order subscriptions in resource picker by\n name. #45228, @sunker\n * Azure monitor Logs: Optimize data fetching in resource\n picker. #44549, @sunker\n * AzureMonitor: Filter list of resources by resourceType.\n #43522, @andresmgot\n * BarChart: color by field, x time field, bar radius, label\n skipping. #43257, @leeoniya\n * Chore: Implement OpenTelemetry in Grafana. #42674, @idafurjes\n * Cloud Monitoring: Adds metric type to Metric drop down\n options. #43268, @tw1nk\n * CloudWatch: Add Data Lifecycle Manager metrics and dimension.\n #43310, @ilyastoli\n * CloudWatch: Add Missing Elasticache Host-level metrics.\n #43455, @dhendo\n * CloudWatch: Add all ElastiCache Redis Metrics. #43336,\n @siavashs\n * CloudWatch: Add new AWS/ES metrics. #43034, @sunker\n * Cloudwatch: Add syntax highlighting and autocomplete for\n \u0027Metric Search\u0027. #43985, @sarahzinger\n * Explore: Support custom display label for exemplar links for\n Prometheus datasource. #42732, @JokerQueue\n * Hotkeys: Make time range absolute/permanent. #43802, @davkal\n * Playlists: Enable sharing direct links to playlists. #44161,\n * SQLStore: Prevent concurrent migrations. #44101, @papagian\n * SSE: Add Mode to drop NaN/Inf/Null in Reduction operations.\n #43583, @kylebrandt\n * Setting: Support configuring feature toggles with bools\n instead of just passing an array. #43326, @bergquist\n * TimeSeries: Add support for negative Y and constant\n transform. #44774, @dprokop\n * Transformations: Add \u0027JSON\u0027 field type to\n ConvertFieldTypeTransformer. #42624, @sd2k\n + Bug fixes (8.4.0):\n * Auth: Guarantee consistency of signed SigV4 headers.\n #45054, @wbrowne\n * CloudWatch: Fix MetricName resetting on Namespace change.\n #44165, @yaelleC\n * Cloudwatch : Fixed reseting metric name when changing\n namespace in Metric Query. #44612, @yaelleC\n * Explore: Avoid locking timepicker when range is inverted.\n #44790, @Elfo404\n * Instrumentation: Fix HTTP request instrumentation of\n authentication failures. #44234, @marefr\n * LibraryPanels: Prevent long descriptions and names from\n obscuring the delete button. #45190, @zuchka\n * OAuth: Fix parsing of ID token if header contains non-string\n value. #44159, @marefr\n * Panel Edit: Visualization search now works correctly with\n special characters. #45137, @ashharrison90\n * Provisioning: Fix duplicate validation when multiple\n organizations have been configured. #44151, @marefr\n * QueryField: Fix issue with undo history when suggestion is\n inserted (#28656). #39114, @glintik\n * TablePanel: Do not prefix columns with frame name if multiple\n frames and override active. #45174, @mdvictor\n + Deprecations (8.4.0):\n AngularJS plugin support is now in a deprecated state, meaning\n it will be removed in a future release. Currently, that is\n planned for version 10 (in 2023). The documentation site has an\n article with more details on why, when, and how. Issue #45149\n- Update to version 8.3.10\n + Security:\n * Fixes XSS vulnerability in the Unified Alerting\n (bsc#1201535, CVE-2022-31097)\n * Fixes OAuth account takeover vulnerability\n (bsc#1201539, CVE-2022-31107)\n- Update to version 8.3.9\n + Bug fixes:\n * Geomap: Display legend\n * Prometheus: Fix timestamp truncation\n- Update to version 8.3.7\n * Provisioning: Ensure that the default value for orgID is set\n when provisioning datasources to be deleted.\n- Update to version 8.3.6\n * Cloud Monitoring: Reduce request size when listing labels.\n * Explore: Show scalar data result in a table instead of graph.\n * Snapshots: Updates the default external snapshot server URL.\n * Table: Makes footer not overlap table content.\n * Tempo: Add request histogram to service graph datalink.\n * Tempo: Add time range to tempo search query behind a feature flag.\n * Tempo: Auto-clear results when changing query type.\n * Tempo: Display start time in search results as relative time.\n * CloudMonitoring: Fix resource labels in query editor.\n * Cursor sync: Apply the settings without saving the dashboard.\n * LibraryPanels: Fix for Error while cleaning library panels.\n * Logs Panel: Fix timestamp parsing for string dates without timezone.\n * Prometheus: Fix some of the alerting queries that use reduce/math operation.\n * TablePanel: Fix ad-hoc variables not working on default datasources.\n * Text Panel: Fix alignment of elements.\n * Variables: Fix for constant variables in self referencing links.\n- Update _constraints to require at least 5GB, because with less we\n can\u0027t build it.\n- Update to version 8.3.5 (jsc#SLE-23439, jsc#SLE-23422,\n jsc#SLE-24565)\n + Security: Fixes CVE-2021-43813 and CVE-2021-43815,\n bsc#1193686.\n + Security: Fixes CVE-2021-43798, bsc#1193492.\n + Security: Fixes CVE-2021-41244, bsc#1192763.\n + Security: Fixes CVE-2021-41174, bsc#1192383.\n fix CVE-2021-3711, bsc#1189520.\n * Security: Update dependencies to fix CVE-2021-36222,\n bsc#1188571.\n\nmgr-push:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.6-1\n * Remove unused makefiles\n- Version 4.4.5-1\n * Use http to connect to localhost server\n * Use bundle CA certificate in rhnpush\n- Version 4.4.4-1\n * remove pylint check at build time\n- Version 4.4.3-1\n * Ensure installation of make for building\n- Version 4.4.2-1\n * Update translation strings\n- Version 4.4.1-1\n * Bump version to 4.4.0\n\nprometheus-blackbox_exporter:\n\n- Use obscpio for go modules service\n- Set version number\n- Set build date from SOURCE_DATE_EPOCH\n- Update to 0.24.0 (bsc#1212279, jsc#PED-4556)\n * Requires go1.19\n- Drop:\n- Avoid empty validation script\n- Add rc symlink for backwards compatibility\n- Fix authentication bypass via cache poisoning\n (CVE-2022-46146, bsc#1208062)\n- Add `min_version` parameter of `tls_config` to allow enabling\n TLS 1.0 and 1.1 (bsc#1209113)\n- On SUSE Linux Enterprise build always with Go \u003e= 1.19 (bsc#1203599)\n- Build with go1.18 only for SLE-15-SP3 and \n build with \u003e= go1.19 on higher SP (bsc#1203599)\n- Require go1.18 (bsc#1203599, GH#19127)\n- Exclude s390 arch\n- Fix %pre section to avoid empty content\n- Updated to allow building on older rpmbuild.\n- Enhanced to build on Enterprise Linux 8\n\nprometheus-postgres_exporter:\n\n- CVE-2022-46146: Fix authentication bypass via cache poisoning (bsc#1208060)\n- Remove duplicated call to systemd requirements\n- Do not build debug if RHEL \u003e= 8\n- Do not strip if SUSE Linux Enterprise 15 SP3\n- Build at least with with Go \u003e= 1.18 on RHEL\n- Build with Go \u003e= 1.20 elsewhere\n- Adapt the systemd service security configuration\n to be able to start it on RHEL systems and clones\n- Create the prometheus user for RHEL systems and clones\n- Fix _service to pull correct version\n- Use go_modules source service\n- Upgrade to version 0.10.1:\n * Fix broken log-level for values other than debug (bsc#1208965)\n- Version/release lines above first usage of those macros.\n gh#uyuni-project/uyuni#5418\n- Prevent empty %pre section\n- Exclude s390 builds \n- Updated for RHEL8.\n\npython-hwdata:\n\n- Declare the LICENSE file as license and not doc\n\npython-pyvmomi:\n\n- Preparing submission to SUSE:SLE-15-SP3:Update as part of ECO PED-3623.\n\nrhnlib:\n\n- Version 5.0.1-1\n * Specify a packager for Debian like distros\n- Version 4.4.6-1\n * Remove unused makefiles\n- Version 4.4.5-1\n * Use bundle CA certificate in rhnpush\n- Version 4.4.4-1\n * Only use TLSv1+ for SSL connections\n- Version 4.4.3-1\n * Ensure installation of make for building\n- Version 4.4.2-1\n * Don\u0027t get stuck at the end of SSL transfers (bsc#1204032)\n- Version 4.4.1-1\n * Bump version to 4.4.0\n\nspacecmd:\n\n- Version 5.0.1-1\n * Use localhost without ssl when running on the server\n- Version 4.4.10-1\n * Update translation strings\n- Version 4.4.9-1\n- Version 4.4.8-1\n * Add spacecmd function: cryptokey_update\n * Bypass traditional systems check on older SUMA instances (bsc#1208612)\n * fix argument parsing of distribution_update (bsc#1210458)\n- Version 4.4.7-1\n * remove pylint check at build time\n * Display activation key details after executing the corresponding command (bsc#1208719)\n * Show targetted packages before actually removing them (bsc#1207830)\n- Version 4.4.6-1\n * Fix spacecmd not showing any output for softwarechannel_diff \n and softwarechannel_errata_diff (bsc#1207352)\n- Version 4.4.5-1\n * Prevent string api parameters to be parsed as dates if not in\n ISO-8601 format (bsc#1205759)\n * Add python-dateutil dependency, required to process date values in\n spacecmd api calls\n * Remove python3-simplejson dependency\n- Version 4.4.4-1\n * Correctly understand \u0027ssm\u0027 keyword on scap scheduling\n * Add vendor_advisory information to errata_details call (bsc#1205207)\n * Change default port of \u0027Containerized Proxy configuration\u0027 8022\n- Version 4.4.3-1\n * Added two missing options to schedule product migration: allow-vendor-change\n and remove-products-without-successor (bsc#1204126)\n * Changed schedule product migration to use the correct API method\n * Fix dict_keys not supporting indexing in systems_setconfigchannelorger\n * Added a warning message for traditional stack deprecation\n * Remove \u0027Undefined return code\u0027 from debug messages (bsc#1203283)\n- Version 4.4.2-1\n * Stop always showing help for valid proxy_container_config calls\n- Version 4.4.1-1\n * Process date values in spacecmd api calls (bsc#1198903)\n * Improve Proxy FQDN hint message\n- Version 4.3.14-1\n * Fix missing argument on system_listmigrationtargets (bsc#1201003)\n * Show correct help on calling kickstart_importjson with no arguments\n * Fix tracebacks on spacecmd kickstart_export (bsc#1200591)\n * Change proxy container config default filename to end with tar.gz\n- Version 4.3.13-1\n- Version 4.3.12-1\n- Version 4.3.11-1\n * on full system update call schedulePackageUpdate API (bsc#1197507)\n\nspacewalk-client-tools:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.7-1\n * Remove unused and deprecated/removed platform.dist import.\n- Version 4.4.6-1\n * Update translation strings\n * Tito requires to list the package source as %{name}-%{version}.tar.gz\n- Version 4.4.5-1\n * remove mgr-virtualization usage\n * remove dependency to suseRegisterInfo\n- Version 4.4.4-1\n- Version 4.4.3-1\n- Version 4.4.2-1\n- Version 4.4.1-1\n- Version 4.3.11-1\n- Version 4.3.10-1\n\nsupportutils-plugin-salt:\n\n- Update to version 1.2.2\n * Remove possible passwords from Salt configuration files (bsc#1201059)\n- Update to version 1.2.1\n * Remove ERROR messages on Salt client systems\n- Declare the LICENSE file as license and not doc\n- Update to version 1.2.0\n * Add support for Salt Bundle\n\nsupportutils-plugin-susemanager-client:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.2-1\n * write configured crypto-policy in supportconfig\n * add cloud and payg checks\n- Version 4.4.1-1\n * Bump version to 4.4.0\n- Version 4.3.2-1\n * Add proxy containers config and logs\n\nuyuni-common-libs:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.4-1\n * Workaround for python3-debian bug about collecting control file (bsc#1211525, bsc#1208692)\n * Accept missing rhn.conf file\n * Use context manager for apache users in fileutils.py.\n- Version 4.4.3-1\n * Ensure installation of make for building.\n * Use versioned Python during packaging.\n- Version 4.4.2-1\n * unify user notification code on java side\n- Version 4.4.1-1\n * Do not allow creating path if nonexistent user or group in fileutils.\n- Version 4.3.5-1\n * Fix reposync issue about \u0027rpm.hdr\u0027 object has no attribute \u0027get\u0027\n\nuyuni-proxy-systemd-services:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.2-1\n * Fix script for allowing using container images from different registry paths\n * Allow using container images from different registry paths\n- Version 4.4.1-1\n * Expose /etc/sysconfig/proxy variables to container services (bsc#1202945)\n- Version 4.3.6-1\n * Expose port 80 (bsc#1200142)\n * Use volumes rather than bind mounts\n * TFTPD to listen on udp port (bsc#1200968)\n * Add TAG variable in configuration \n- Version 4.3.5-1\n * Fix containers namespaces in configuration\n- Version 4.3.4-1\n * Rename container_images_path specfile macro to less generic one\n- Version 4.3.3-1\n * Default to SUSE Manager images only when installed from SUSE Manager\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-196,SUSE-SLE-Manager-Tools-15-BETA-2024-196,SUSE-SLE-Manager-Tools-Beta-For-Micro-5-2024-196", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0196-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0196-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240196-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0196-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" }, { "category": "self", "summary": "SUSE Bug 1172110", "url": "https://bugzilla.suse.com/1172110" }, { "category": "self", "summary": "SUSE Bug 1176460", "url": "https://bugzilla.suse.com/1176460" }, { "category": "self", "summary": "SUSE Bug 1180816", "url": "https://bugzilla.suse.com/1180816" }, { "category": "self", "summary": "SUSE Bug 1180942", "url": "https://bugzilla.suse.com/1180942" }, { "category": "self", "summary": "SUSE Bug 1181119", "url": "https://bugzilla.suse.com/1181119" }, { "category": "self", "summary": "SUSE Bug 1181935", "url": "https://bugzilla.suse.com/1181935" }, { "category": "self", "summary": "SUSE Bug 1183684", "url": "https://bugzilla.suse.com/1183684" }, { "category": "self", "summary": "SUSE Bug 1187725", "url": "https://bugzilla.suse.com/1187725" }, { "category": "self", "summary": "SUSE Bug 1188061", "url": "https://bugzilla.suse.com/1188061" }, { "category": "self", "summary": "SUSE Bug 1188571", "url": "https://bugzilla.suse.com/1188571" }, { "category": "self", "summary": "SUSE Bug 1189520", "url": "https://bugzilla.suse.com/1189520" }, { "category": "self", "summary": "SUSE Bug 1191454", "url": "https://bugzilla.suse.com/1191454" }, { "category": "self", "summary": "SUSE Bug 1192154", "url": "https://bugzilla.suse.com/1192154" }, { "category": "self", "summary": "SUSE Bug 1192383", "url": "https://bugzilla.suse.com/1192383" }, { "category": "self", "summary": "SUSE Bug 1192696", "url": "https://bugzilla.suse.com/1192696" }, { "category": "self", "summary": "SUSE Bug 1192763", "url": "https://bugzilla.suse.com/1192763" }, { "category": "self", "summary": "SUSE Bug 1193492", "url": "https://bugzilla.suse.com/1193492" }, { "category": "self", "summary": "SUSE Bug 1193686", "url": "https://bugzilla.suse.com/1193686" }, { "category": "self", "summary": "SUSE Bug 1193688", "url": "https://bugzilla.suse.com/1193688" }, { "category": "self", "summary": "SUSE Bug 1197507", "url": "https://bugzilla.suse.com/1197507" }, { "category": "self", "summary": "SUSE Bug 1198903", "url": "https://bugzilla.suse.com/1198903" }, { "category": "self", "summary": "SUSE Bug 1199810", "url": "https://bugzilla.suse.com/1199810" }, { "category": "self", "summary": "SUSE Bug 1200142", "url": "https://bugzilla.suse.com/1200142" }, { "category": "self", "summary": "SUSE Bug 1200480", "url": "https://bugzilla.suse.com/1200480" }, { "category": "self", "summary": "SUSE Bug 1200591", "url": "https://bugzilla.suse.com/1200591" }, { "category": "self", "summary": "SUSE Bug 1200968", "url": "https://bugzilla.suse.com/1200968" }, { "category": "self", "summary": "SUSE Bug 1200970", "url": "https://bugzilla.suse.com/1200970" }, { "category": "self", "summary": "SUSE Bug 1201003", "url": "https://bugzilla.suse.com/1201003" }, { "category": "self", "summary": "SUSE Bug 1201059", "url": "https://bugzilla.suse.com/1201059" }, { "category": "self", "summary": "SUSE Bug 1201535", "url": "https://bugzilla.suse.com/1201535" }, { "category": "self", "summary": "SUSE Bug 1201539", "url": "https://bugzilla.suse.com/1201539" }, { "category": "self", "summary": "SUSE Bug 1202614", "url": "https://bugzilla.suse.com/1202614" }, { "category": "self", "summary": "SUSE Bug 1202945", "url": "https://bugzilla.suse.com/1202945" }, { "category": "self", "summary": "SUSE Bug 1203283", "url": "https://bugzilla.suse.com/1203283" }, { "category": "self", "summary": "SUSE Bug 1203596", "url": "https://bugzilla.suse.com/1203596" }, { "category": "self", "summary": "SUSE Bug 1203597", "url": "https://bugzilla.suse.com/1203597" }, { "category": "self", "summary": "SUSE Bug 1203599", "url": "https://bugzilla.suse.com/1203599" }, { "category": "self", "summary": "SUSE Bug 1204032", "url": "https://bugzilla.suse.com/1204032" }, { "category": "self", "summary": "SUSE Bug 1204126", "url": "https://bugzilla.suse.com/1204126" }, { "category": "self", "summary": "SUSE Bug 1204302", "url": "https://bugzilla.suse.com/1204302" }, { "category": "self", "summary": "SUSE Bug 1204303", "url": "https://bugzilla.suse.com/1204303" }, { "category": "self", "summary": "SUSE Bug 1204304", "url": "https://bugzilla.suse.com/1204304" }, { "category": "self", "summary": "SUSE Bug 1204305", "url": "https://bugzilla.suse.com/1204305" }, { "category": "self", "summary": "SUSE Bug 1204501", "url": "https://bugzilla.suse.com/1204501" }, { "category": "self", "summary": "SUSE Bug 1205207", "url": "https://bugzilla.suse.com/1205207" }, { "category": "self", "summary": "SUSE Bug 1205225", "url": "https://bugzilla.suse.com/1205225" }, { "category": "self", "summary": "SUSE Bug 1205227", "url": "https://bugzilla.suse.com/1205227" }, { "category": "self", "summary": "SUSE Bug 1205599", "url": "https://bugzilla.suse.com/1205599" }, { "category": "self", "summary": "SUSE Bug 1205759", "url": "https://bugzilla.suse.com/1205759" }, { "category": "self", "summary": "SUSE Bug 1207352", "url": "https://bugzilla.suse.com/1207352" }, { "category": "self", "summary": "SUSE Bug 1207749", "url": "https://bugzilla.suse.com/1207749" }, { "category": "self", "summary": "SUSE Bug 1207750", "url": "https://bugzilla.suse.com/1207750" }, { "category": "self", "summary": "SUSE Bug 1207830", "url": "https://bugzilla.suse.com/1207830" }, { "category": "self", "summary": "SUSE Bug 1208046", "url": "https://bugzilla.suse.com/1208046" }, { "category": "self", "summary": "SUSE Bug 1208049", "url": "https://bugzilla.suse.com/1208049" }, { "category": "self", "summary": "SUSE Bug 1208060", "url": "https://bugzilla.suse.com/1208060" }, { "category": "self", "summary": "SUSE Bug 1208062", "url": "https://bugzilla.suse.com/1208062" }, { "category": "self", "summary": "SUSE Bug 1208065", "url": "https://bugzilla.suse.com/1208065" }, { "category": "self", "summary": "SUSE Bug 1208270", "url": "https://bugzilla.suse.com/1208270" }, { "category": "self", "summary": "SUSE Bug 1208293", "url": "https://bugzilla.suse.com/1208293" }, { "category": "self", "summary": "SUSE Bug 1208298", "url": "https://bugzilla.suse.com/1208298" }, { "category": "self", "summary": "SUSE Bug 1208612", "url": "https://bugzilla.suse.com/1208612" }, { "category": "self", "summary": "SUSE Bug 1208692", "url": "https://bugzilla.suse.com/1208692" }, { "category": "self", "summary": "SUSE Bug 1208719", "url": "https://bugzilla.suse.com/1208719" }, { "category": "self", "summary": "SUSE Bug 1208819", "url": "https://bugzilla.suse.com/1208819" }, { "category": "self", "summary": "SUSE Bug 1208821", "url": "https://bugzilla.suse.com/1208821" }, { "category": "self", "summary": "SUSE Bug 1208965", "url": "https://bugzilla.suse.com/1208965" }, { "category": "self", "summary": "SUSE Bug 1209113", "url": "https://bugzilla.suse.com/1209113" }, { "category": "self", "summary": "SUSE Bug 1209645", "url": "https://bugzilla.suse.com/1209645" }, { "category": "self", "summary": "SUSE Bug 1210458", "url": "https://bugzilla.suse.com/1210458" }, { "category": "self", "summary": "SUSE Bug 1210640", "url": "https://bugzilla.suse.com/1210640" }, { "category": "self", "summary": "SUSE Bug 1210907", "url": "https://bugzilla.suse.com/1210907" }, { "category": "self", "summary": "SUSE Bug 1211525", "url": "https://bugzilla.suse.com/1211525" }, { "category": "self", "summary": "SUSE Bug 1212099", "url": "https://bugzilla.suse.com/1212099" }, { "category": "self", "summary": "SUSE Bug 1212100", "url": "https://bugzilla.suse.com/1212100" }, { "category": "self", "summary": "SUSE Bug 1212279", "url": "https://bugzilla.suse.com/1212279" }, { "category": "self", "summary": "SUSE Bug 1212641", "url": "https://bugzilla.suse.com/1212641" }, { "category": "self", "summary": "SUSE Bug 1218843", "url": "https://bugzilla.suse.com/1218843" }, { "category": "self", "summary": "SUSE Bug 1218844", "url": "https://bugzilla.suse.com/1218844" }, { "category": "self", "summary": "SUSE CVE CVE-2020-7753 page", "url": "https://www.suse.com/security/cve/CVE-2020-7753/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-20178 page", "url": "https://www.suse.com/security/cve/CVE-2021-20178/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-20180 page", "url": "https://www.suse.com/security/cve/CVE-2021-20180/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-20191 page", "url": "https://www.suse.com/security/cve/CVE-2021-20191/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-20228 page", "url": "https://www.suse.com/security/cve/CVE-2021-20228/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3447 page", "url": "https://www.suse.com/security/cve/CVE-2021-3447/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3583 page", "url": "https://www.suse.com/security/cve/CVE-2021-3583/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3620 page", "url": "https://www.suse.com/security/cve/CVE-2021-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-36222 page", "url": "https://www.suse.com/security/cve/CVE-2021-36222/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3711 page", "url": "https://www.suse.com/security/cve/CVE-2021-3711/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3807 page", "url": "https://www.suse.com/security/cve/CVE-2021-3807/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3918 page", "url": "https://www.suse.com/security/cve/CVE-2021-3918/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41174 page", "url": "https://www.suse.com/security/cve/CVE-2021-41174/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41244 page", "url": "https://www.suse.com/security/cve/CVE-2021-41244/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43138 page", "url": "https://www.suse.com/security/cve/CVE-2021-43138/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43798 page", "url": "https://www.suse.com/security/cve/CVE-2021-43798/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43813 page", "url": "https://www.suse.com/security/cve/CVE-2021-43813/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43815 page", "url": "https://www.suse.com/security/cve/CVE-2021-43815/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0155 page", "url": "https://www.suse.com/security/cve/CVE-2022-0155/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23552 page", "url": "https://www.suse.com/security/cve/CVE-2022-23552/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-27664 page", "url": "https://www.suse.com/security/cve/CVE-2022-27664/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29170 page", "url": "https://www.suse.com/security/cve/CVE-2022-29170/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-31097 page", "url": "https://www.suse.com/security/cve/CVE-2022-31097/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-31107 page", "url": "https://www.suse.com/security/cve/CVE-2022-31107/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-31123 page", "url": "https://www.suse.com/security/cve/CVE-2022-31123/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-31130 page", "url": "https://www.suse.com/security/cve/CVE-2022-31130/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-32149 page", "url": "https://www.suse.com/security/cve/CVE-2022-32149/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-35957 page", "url": "https://www.suse.com/security/cve/CVE-2022-35957/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-36062 page", "url": "https://www.suse.com/security/cve/CVE-2022-36062/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-39201 page", "url": "https://www.suse.com/security/cve/CVE-2022-39201/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-39229 page", "url": "https://www.suse.com/security/cve/CVE-2022-39229/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-39306 page", "url": "https://www.suse.com/security/cve/CVE-2022-39306/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-39307 page", "url": "https://www.suse.com/security/cve/CVE-2022-39307/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-39324 page", "url": "https://www.suse.com/security/cve/CVE-2022-39324/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-41715 page", "url": "https://www.suse.com/security/cve/CVE-2022-41715/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-41723 page", "url": "https://www.suse.com/security/cve/CVE-2022-41723/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-46146 page", "url": "https://www.suse.com/security/cve/CVE-2022-46146/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0507 page", "url": "https://www.suse.com/security/cve/CVE-2023-0507/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0594 page", "url": "https://www.suse.com/security/cve/CVE-2023-0594/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1387 page", "url": "https://www.suse.com/security/cve/CVE-2023-1387/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1410 page", "url": "https://www.suse.com/security/cve/CVE-2023-1410/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2183 page", "url": "https://www.suse.com/security/cve/CVE-2023-2183/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2801 page", "url": "https://www.suse.com/security/cve/CVE-2023-2801/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3128 page", "url": "https://www.suse.com/security/cve/CVE-2023-3128/" } ], "title": "Security Beta update for SUSE Manager Client Tools and Salt", "tracking": { "current_release_date": "2024-01-23T15:20:05Z", "generator": { "date": "2024-01-23T15:20:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0196-1", "initial_release_date": "2024-01-23T15:20:05Z", "revision_history": [ { "date": "2024-01-23T15:20:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "product": { "name": "firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "product_id": "firewalld-prometheus-config-0.1-159000.6.33.1.aarch64" } }, { "category": "product_version", "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "product": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64" } }, { "category": "product_version", "name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "product": { "name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "product_id": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64" } }, { "category": "product_version", "name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "product": { "name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64" } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "product": { "name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "product_id": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64" } }, { "category": "product_version", "name": "grafana-9.5.8-159000.4.24.1.aarch64", "product": { "name": "grafana-9.5.8-159000.4.24.1.aarch64", "product_id": "grafana-9.5.8-159000.4.24.1.aarch64" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "product": { "name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "product_id": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64" } }, { "category": "product_version", "name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "product": { "name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "product_id": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64" } }, { "category": "product_version", "name": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "product": { "name": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "product_id": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64" } }, { "category": "product_version", "name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "product": { "name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "product_id": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64" } }, { "category": "product_version", "name": "python3-yarl-1.3.0-159000.3.6.1.aarch64", "product": { "name": "python3-yarl-1.3.0-159000.3.6.1.aarch64", "product_id": "python3-yarl-1.3.0-159000.3.6.1.aarch64" } }, { "category": "product_version", "name": "uyuni-base-common-5.0.1-159000.3.18.1.aarch64", "product": { "name": "uyuni-base-common-5.0.1-159000.3.18.1.aarch64", "product_id": "uyuni-base-common-5.0.1-159000.3.18.1.aarch64" } }, { "category": "product_version", "name": "uyuni-base-proxy-5.0.1-159000.3.18.1.aarch64", "product": { "name": "uyuni-base-proxy-5.0.1-159000.3.18.1.aarch64", "product_id": "uyuni-base-proxy-5.0.1-159000.3.18.1.aarch64" } }, { "category": "product_version", "name": "uyuni-base-server-5.0.1-159000.3.18.1.aarch64", "product": { "name": "uyuni-base-server-5.0.1-159000.3.18.1.aarch64", "product_id": "uyuni-base-server-5.0.1-159000.3.18.1.aarch64" } }, { "category": "product_version", "name": "wire-0.5.0-159000.3.9.1.aarch64", "product": { "name": "wire-0.5.0-159000.3.9.1.aarch64", "product_id": "wire-0.5.0-159000.3.9.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ansible-2.9.27-159000.3.9.1.noarch", "product": { "name": "ansible-2.9.27-159000.3.9.1.noarch", "product_id": "ansible-2.9.27-159000.3.9.1.noarch" } }, { "category": "product_version", "name": "ansible-doc-2.9.27-159000.3.9.1.noarch", "product": { "name": "ansible-doc-2.9.27-159000.3.9.1.noarch", "product_id": "ansible-doc-2.9.27-159000.3.9.1.noarch" } }, { "category": "product_version", "name": "ansible-test-2.9.27-159000.3.9.1.noarch", "product": { "name": "ansible-test-2.9.27-159000.3.9.1.noarch", "product_id": "ansible-test-2.9.27-159000.3.9.1.noarch" } }, { "category": "product_version", "name": "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "product": { "name": "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "product_id": "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch" } }, { "category": "product_version", "name": "mgr-push-5.0.1-159000.4.21.1.noarch", "product": { "name": "mgr-push-5.0.1-159000.4.21.1.noarch", "product_id": "mgr-push-5.0.1-159000.4.21.1.noarch" } }, { "category": "product_version", "name": "python2-hwdata-2.3.5-159000.5.13.1.noarch", "product": { "name": "python2-hwdata-2.3.5-159000.5.13.1.noarch", "product_id": "python2-hwdata-2.3.5-159000.5.13.1.noarch" } }, { "category": "product_version", "name": "python2-pyvmomi-6.7.3-159000.3.6.1.noarch", "product": { "name": "python2-pyvmomi-6.7.3-159000.3.6.1.noarch", "product_id": "python2-pyvmomi-6.7.3-159000.3.6.1.noarch" } }, { "category": "product_version", "name": "python3-hwdata-2.3.5-159000.5.13.1.noarch", "product": { "name": "python3-hwdata-2.3.5-159000.5.13.1.noarch", "product_id": "python3-hwdata-2.3.5-159000.5.13.1.noarch" } }, { "category": "product_version", "name": "python3-mgr-push-5.0.1-159000.4.21.1.noarch", "product": { "name": "python3-mgr-push-5.0.1-159000.4.21.1.noarch", "product_id": "python3-mgr-push-5.0.1-159000.4.21.1.noarch" } }, { "category": "product_version", "name": "python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "product": { "name": "python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "product_id": "python3-pyvmomi-6.7.3-159000.3.6.1.noarch" } }, { "category": "product_version", "name": "python3-rhnlib-5.0.1-159000.6.30.1.noarch", "product": { "name": "python3-rhnlib-5.0.1-159000.6.30.1.noarch", "product_id": "python3-rhnlib-5.0.1-159000.6.30.1.noarch" } }, { "category": "product_version", "name": "python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "product": { "name": "python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "product_id": "python3-spacewalk-check-5.0.1-159000.6.48.1.noarch" } }, { "category": "product_version", "name": "python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "product": { "name": "python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "product_id": "python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch" } }, { "category": "product_version", "name": "python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "product": { "name": "python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "product_id": "python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch" } }, { "category": "product_version", "name": "spacecmd-5.0.1-159000.6.42.1.noarch", "product": { "name": "spacecmd-5.0.1-159000.6.42.1.noarch", "product_id": "spacecmd-5.0.1-159000.6.42.1.noarch" } }, { "category": "product_version", "name": "spacewalk-check-5.0.1-159000.6.48.1.noarch", "product": { "name": "spacewalk-check-5.0.1-159000.6.48.1.noarch", "product_id": "spacewalk-check-5.0.1-159000.6.48.1.noarch" } }, { "category": "product_version", "name": "spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "product": { "name": "spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "product_id": "spacewalk-client-setup-5.0.1-159000.6.48.1.noarch" } }, { "category": "product_version", "name": "spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "product": { "name": "spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "product_id": "spacewalk-client-tools-5.0.1-159000.6.48.1.noarch" } }, { "category": "product_version", "name": "supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "product": { "name": "supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "product_id": "supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch" } }, { "category": "product_version", "name": "supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "product": { "name": "supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "product_id": "supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch" } }, { "category": "product_version", "name": "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "product": { "name": "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "product_id": "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "product": { "name": "firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "product_id": "firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le" } }, { "category": "product_version", "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "product": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le" } }, { "category": "product_version", "name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "product": { "name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "product_id": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le" } }, { "category": "product_version", "name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "product": { "name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le" } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "product": { "name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "product_id": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le" } }, { "category": "product_version", "name": "grafana-9.5.8-159000.4.24.1.ppc64le", "product": { "name": "grafana-9.5.8-159000.4.24.1.ppc64le", "product_id": "grafana-9.5.8-159000.4.24.1.ppc64le" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "product": { "name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "product_id": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le" } }, { "category": "product_version", "name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "product": { "name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "product_id": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le" } }, { "category": "product_version", "name": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "product": { "name": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "product_id": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le" } }, { "category": "product_version", "name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "product": { "name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "product_id": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le" } }, { "category": "product_version", "name": "python3-yarl-1.3.0-159000.3.6.1.ppc64le", "product": { "name": "python3-yarl-1.3.0-159000.3.6.1.ppc64le", "product_id": "python3-yarl-1.3.0-159000.3.6.1.ppc64le" } }, { "category": "product_version", "name": "uyuni-base-common-5.0.1-159000.3.18.1.ppc64le", "product": { "name": "uyuni-base-common-5.0.1-159000.3.18.1.ppc64le", "product_id": "uyuni-base-common-5.0.1-159000.3.18.1.ppc64le" } }, { "category": "product_version", "name": "uyuni-base-proxy-5.0.1-159000.3.18.1.ppc64le", "product": { "name": "uyuni-base-proxy-5.0.1-159000.3.18.1.ppc64le", "product_id": "uyuni-base-proxy-5.0.1-159000.3.18.1.ppc64le" } }, { "category": "product_version", "name": "uyuni-base-server-5.0.1-159000.3.18.1.ppc64le", "product": { "name": "uyuni-base-server-5.0.1-159000.3.18.1.ppc64le", "product_id": "uyuni-base-server-5.0.1-159000.3.18.1.ppc64le" } }, { "category": "product_version", "name": "wire-0.5.0-159000.3.9.1.ppc64le", "product": { "name": "wire-0.5.0-159000.3.9.1.ppc64le", "product_id": "wire-0.5.0-159000.3.9.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "product": { "name": "firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "product_id": "firewalld-prometheus-config-0.1-159000.6.33.1.s390x" } }, { "category": "product_version", "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "product": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x" } }, { "category": "product_version", "name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "product": { "name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "product_id": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x" } }, { "category": "product_version", "name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "product": { "name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x" } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "product": { "name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "product_id": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x" } }, { "category": "product_version", "name": "grafana-9.5.8-159000.4.24.1.s390x", "product": { "name": "grafana-9.5.8-159000.4.24.1.s390x", "product_id": "grafana-9.5.8-159000.4.24.1.s390x" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "product": { "name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "product_id": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x" } }, { "category": "product_version", "name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "product": { "name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "product_id": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x" } }, { "category": "product_version", "name": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "product": { "name": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "product_id": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.s390x" } }, { "category": "product_version", "name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "product": { "name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "product_id": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x" } }, { "category": "product_version", "name": "python3-yarl-1.3.0-159000.3.6.1.s390x", "product": { "name": "python3-yarl-1.3.0-159000.3.6.1.s390x", "product_id": "python3-yarl-1.3.0-159000.3.6.1.s390x" } }, { "category": "product_version", "name": "uyuni-base-common-5.0.1-159000.3.18.1.s390x", "product": { "name": "uyuni-base-common-5.0.1-159000.3.18.1.s390x", "product_id": "uyuni-base-common-5.0.1-159000.3.18.1.s390x" } }, { "category": "product_version", "name": "uyuni-base-proxy-5.0.1-159000.3.18.1.s390x", "product": { "name": "uyuni-base-proxy-5.0.1-159000.3.18.1.s390x", "product_id": "uyuni-base-proxy-5.0.1-159000.3.18.1.s390x" } }, { "category": "product_version", "name": "uyuni-base-server-5.0.1-159000.3.18.1.s390x", "product": { "name": "uyuni-base-server-5.0.1-159000.3.18.1.s390x", "product_id": "uyuni-base-server-5.0.1-159000.3.18.1.s390x" } }, { "category": "product_version", "name": "wire-0.5.0-159000.3.9.1.s390x", "product": { "name": "wire-0.5.0-159000.3.9.1.s390x", "product_id": "wire-0.5.0-159000.3.9.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "product": { "name": "firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "product_id": "firewalld-prometheus-config-0.1-159000.6.33.1.x86_64" } }, { "category": "product_version", "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "product": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64" } }, { "category": "product_version", "name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "product": { "name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "product_id": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64" } }, { "category": "product_version", "name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "product": { "name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64" } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "product": { "name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "product_id": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64" } }, { "category": "product_version", "name": "grafana-9.5.8-159000.4.24.1.x86_64", "product": { "name": "grafana-9.5.8-159000.4.24.1.x86_64", "product_id": "grafana-9.5.8-159000.4.24.1.x86_64" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "product": { "name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "product_id": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64" } }, { "category": "product_version", "name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "product": { "name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "product_id": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64" } }, { "category": "product_version", "name": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "product": { "name": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "product_id": "python2-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64" } }, { "category": "product_version", "name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "product": { "name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "product_id": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64" } }, { "category": "product_version", "name": "python3-yarl-1.3.0-159000.3.6.1.x86_64", "product": { "name": "python3-yarl-1.3.0-159000.3.6.1.x86_64", "product_id": "python3-yarl-1.3.0-159000.3.6.1.x86_64" } }, { "category": "product_version", "name": "uyuni-base-common-5.0.1-159000.3.18.1.x86_64", "product": { "name": "uyuni-base-common-5.0.1-159000.3.18.1.x86_64", "product_id": "uyuni-base-common-5.0.1-159000.3.18.1.x86_64" } }, { "category": "product_version", "name": "uyuni-base-proxy-5.0.1-159000.3.18.1.x86_64", "product": { "name": "uyuni-base-proxy-5.0.1-159000.3.18.1.x86_64", "product_id": "uyuni-base-proxy-5.0.1-159000.3.18.1.x86_64" } }, { "category": "product_version", "name": "uyuni-base-server-5.0.1-159000.3.18.1.x86_64", "product": { "name": "uyuni-base-server-5.0.1-159000.3.18.1.x86_64", "product_id": "uyuni-base-server-5.0.1-159000.3.18.1.x86_64" } }, { "category": "product_version", "name": "wire-0.5.0-159000.3.9.1.x86_64", "product": { "name": "wire-0.5.0-159000.3.9.1.x86_64", "product_id": "wire-0.5.0-159000.3.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Manager Client Tools 15-BETA", "product": { "name": "SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA" } }, { "category": "product_name", "name": "SUSE Manager Client Tools Beta for SLE Micro 5", "product": { "name": "SUSE Manager Client Tools Beta for SLE Micro 5", "product_id": "SUSE Manager Client Tools Beta for SLE Micro 5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-manager-tools-beta-micro:5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-2.9.27-159000.3.9.1.noarch as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch" }, "product_reference": "ansible-2.9.27-159000.3.9.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-doc-2.9.27-159000.3.9.1.noarch as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch" }, "product_reference": "ansible-doc-2.9.27-159000.3.9.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch" }, "product_reference": "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "firewalld-prometheus-config-0.1-159000.6.33.1.aarch64 as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64" }, "product_reference": "firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le" }, "product_reference": "firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "firewalld-prometheus-config-0.1-159000.6.33.1.s390x as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x" }, "product_reference": "firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "firewalld-prometheus-config-0.1-159000.6.33.1.x86_64 as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64" }, "product_reference": "firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64 as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64" }, "product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le" }, "product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x" }, "product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64 as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64" }, "product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64 as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64 as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64 as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64" }, "product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le" }, "product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x" }, "product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64 as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64" }, "product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64 as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64" }, "product_reference": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le" }, "product_reference": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x" }, "product_reference": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64 as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64" }, "product_reference": "golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-9.5.8-159000.4.24.1.aarch64 as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64" }, "product_reference": "grafana-9.5.8-159000.4.24.1.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-9.5.8-159000.4.24.1.ppc64le as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le" }, "product_reference": "grafana-9.5.8-159000.4.24.1.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-9.5.8-159000.4.24.1.s390x as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x" }, "product_reference": "grafana-9.5.8-159000.4.24.1.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-9.5.8-159000.4.24.1.x86_64 as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64" }, "product_reference": "grafana-9.5.8-159000.4.24.1.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "mgr-push-5.0.1-159000.4.21.1.noarch as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch" }, "product_reference": "mgr-push-5.0.1-159000.4.21.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64 as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64" }, "product_reference": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le" }, "product_reference": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x" }, "product_reference": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64 as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64" }, "product_reference": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64 as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64" }, "product_reference": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le" }, "product_reference": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x" }, "product_reference": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64 as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64" }, "product_reference": "prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-hwdata-2.3.5-159000.5.13.1.noarch as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch" }, "product_reference": "python3-hwdata-2.3.5-159000.5.13.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-mgr-push-5.0.1-159000.4.21.1.noarch as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch" }, "product_reference": "python3-mgr-push-5.0.1-159000.4.21.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pyvmomi-6.7.3-159000.3.6.1.noarch as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch" }, "product_reference": "python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rhnlib-5.0.1-159000.6.30.1.noarch as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch" }, "product_reference": "python3-rhnlib-5.0.1-159000.6.30.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-spacewalk-check-5.0.1-159000.6.48.1.noarch as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch" }, "product_reference": "python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch" }, "product_reference": "python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch" }, "product_reference": "python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64 as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64" }, "product_reference": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le" }, "product_reference": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x" }, "product_reference": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64 as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64" }, "product_reference": "python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "spacecmd-5.0.1-159000.6.42.1.noarch as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch" }, "product_reference": "spacecmd-5.0.1-159000.6.42.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-check-5.0.1-159000.6.48.1.noarch as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch" }, "product_reference": "spacewalk-check-5.0.1-159000.6.48.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-client-setup-5.0.1-159000.6.48.1.noarch as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch" }, "product_reference": "spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-client-tools-5.0.1-159000.6.48.1.noarch as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch" }, "product_reference": "spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch" }, "product_reference": "supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch" }, "product_reference": "supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch as component of SUSE Manager Client Tools 15-BETA", "product_id": "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" }, "product_reference": "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch as component of SUSE Manager Client Tools Beta for SLE Micro 5", "product_id": "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch" }, "product_reference": "dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools Beta for SLE Micro 5" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64 as component of SUSE Manager Client Tools Beta for SLE Micro 5", "product_id": "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64" }, "product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools Beta for SLE Micro 5" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x as component of SUSE Manager Client Tools Beta for SLE Micro 5", "product_id": "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x" }, "product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "relates_to_product_reference": "SUSE Manager Client Tools Beta for SLE Micro 5" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64 as component of SUSE Manager Client Tools Beta for SLE Micro 5", "product_id": "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64" }, "product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools Beta for SLE Micro 5" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64 as component of SUSE Manager Client Tools Beta for SLE Micro 5", "product_id": "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64" }, "product_reference": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools Beta for SLE Micro 5" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x as component of SUSE Manager Client Tools Beta for SLE Micro 5", "product_id": "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x" }, "product_reference": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "relates_to_product_reference": "SUSE Manager Client Tools Beta for SLE Micro 5" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64 as component of SUSE Manager Client Tools Beta for SLE Micro 5", "product_id": "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64" }, "product_reference": "prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools Beta for SLE Micro 5" }, { "category": "default_component_of", "full_product_name": { "name": "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch as component of SUSE Manager Client Tools Beta for SLE Micro 5", "product_id": "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" }, "product_reference": "uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools Beta for SLE Micro 5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-7753" } ], "notes": [ { "category": "general", "text": "All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-7753", "url": "https://www.suse.com/security/cve/CVE-2020-7753" }, { "category": "external", "summary": "SUSE Bug 1218843 for CVE-2020-7753", "url": "https://bugzilla.suse.com/1218843" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "important" } ], "title": "CVE-2020-7753" }, { "cve": "CVE-2021-20178", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-20178" } ], "notes": [ { "category": "general", "text": "A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-20178", "url": "https://www.suse.com/security/cve/CVE-2021-20178" }, { "category": "external", "summary": "SUSE Bug 1180816 for CVE-2021-20178", "url": "https://bugzilla.suse.com/1180816" }, { "category": "external", "summary": "SUSE Bug 1186493 for CVE-2021-20178", "url": "https://bugzilla.suse.com/1186493" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2021-20178" }, { "cve": "CVE-2021-20180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-20180" } ], "notes": [ { "category": "general", "text": "A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-20180", "url": "https://www.suse.com/security/cve/CVE-2021-20180" }, { "category": "external", "summary": "SUSE Bug 1180942 for CVE-2021-20180", "url": "https://bugzilla.suse.com/1180942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2021-20180" }, { "cve": "CVE-2021-20191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-20191" } ], "notes": [ { "category": "general", "text": "A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality. Versions before ansible 2.9.18 are affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-20191", "url": "https://www.suse.com/security/cve/CVE-2021-20191" }, { "category": "external", "summary": "SUSE Bug 1181119 for CVE-2021-20191", "url": "https://bugzilla.suse.com/1181119" }, { "category": "external", "summary": "SUSE Bug 1181935 for CVE-2021-20191", "url": "https://bugzilla.suse.com/1181935" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2021-20191" }, { "cve": "CVE-2021-20228", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-20228" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Ansible Engine 2.9.18, where sensitive info is not masked by default and is not protected by the no_log feature when using the sub-option feature of the basic.py module. This flaw allows an attacker to obtain sensitive information. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-20228", "url": "https://www.suse.com/security/cve/CVE-2021-20228" }, { "category": "external", "summary": "SUSE Bug 1181935 for CVE-2021-20228", "url": "https://bugzilla.suse.com/1181935" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2021-20228" }, { "cve": "CVE-2021-3447", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3447" } ], "notes": [ { "category": "general", "text": "A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3447", "url": "https://www.suse.com/security/cve/CVE-2021-3447" }, { "category": "external", "summary": "SUSE Bug 1183684 for CVE-2021-3447", "url": "https://bugzilla.suse.com/1183684" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2021-3447" }, { "cve": "CVE-2021-3583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3583" } ], "notes": [ { "category": "general", "text": "A flaw was found in Ansible, where a user\u0027s controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3583", "url": "https://www.suse.com/security/cve/CVE-2021-3583" }, { "category": "external", "summary": "SUSE Bug 1188061 for CVE-2021-3583", "url": "https://bugzilla.suse.com/1188061" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2021-3583" }, { "cve": "CVE-2021-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3620" } ], "notes": [ { "category": "general", "text": "A flaw was found in Ansible Engine\u0027s ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3620", "url": "https://www.suse.com/security/cve/CVE-2021-3620" }, { "category": "external", "summary": "SUSE Bug 1187725 for CVE-2021-3620", "url": "https://bugzilla.suse.com/1187725" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2021-3620" }, { "cve": "CVE-2021-36222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-36222" } ], "notes": [ { "category": "general", "text": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-36222", "url": "https://www.suse.com/security/cve/CVE-2021-36222" }, { "category": "external", "summary": "SUSE Bug 1188571 for CVE-2021-36222", "url": "https://bugzilla.suse.com/1188571" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "important" } ], "title": "CVE-2021-36222" }, { "cve": "CVE-2021-3711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3711" } ], "notes": [ { "category": "general", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3711", "url": "https://www.suse.com/security/cve/CVE-2021-3711" }, { "category": "external", "summary": "SUSE Bug 1189520 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1189520" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1205663 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1205663" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "critical" } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3807", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3807" } ], "notes": [ { "category": "general", "text": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3807", "url": "https://www.suse.com/security/cve/CVE-2021-3807" }, { "category": "external", "summary": "SUSE Bug 1192154 for CVE-2021-3807", "url": "https://bugzilla.suse.com/1192154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "important" } ], "title": "CVE-2021-3807" }, { "cve": "CVE-2021-3918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3918" } ], "notes": [ { "category": "general", "text": "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3918", "url": "https://www.suse.com/security/cve/CVE-2021-3918" }, { "category": "external", "summary": "SUSE Bug 1192696 for CVE-2021-3918", "url": "https://bugzilla.suse.com/1192696" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "important" } ], "title": "CVE-2021-3918" }, { "cve": "CVE-2021-41174", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41174" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions if an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim\u0027s browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} ex: {{constructor.constructor(\u0027alert(1)\u0027)()}}. When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. Users are advised to upgrade as soon as possible. If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string {{ in the path.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41174", "url": "https://www.suse.com/security/cve/CVE-2021-41174" }, { "category": "external", "summary": "SUSE Bug 1192383 for CVE-2021-41174", "url": "https://bugzilla.suse.com/1192383" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2021-41174" }, { "cve": "CVE-2021-41244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41244" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions when the fine-grained access control beta feature is enabled and there is more than one organization in the Grafana instance admins are able to access users from other organizations. Grafana 8.0 introduced a mechanism which allowed users with the Organization Admin role to list, add, remove, and update users\u0027 roles in other organizations in which they are not an admin. With fine-grained access control enabled, organization admins can list, add, remove and update users\u0027 roles in another organization, where they do not have organization admin role. All installations between v8.0 and v8.2.3 that have fine-grained access control beta enabled and more than one organization should be upgraded as soon as possible. If you cannot upgrade, you should turn off the fine-grained access control using a feature flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41244", "url": "https://www.suse.com/security/cve/CVE-2021-41244" }, { "category": "external", "summary": "SUSE Bug 1192763 for CVE-2021-41244", "url": "https://bugzilla.suse.com/1192763" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "critical" } ], "title": "CVE-2021-41244" }, { "cve": "CVE-2021-43138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43138" } ], "notes": [ { "category": "general", "text": "In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43138", "url": "https://www.suse.com/security/cve/CVE-2021-43138" }, { "category": "external", "summary": "SUSE Bug 1200480 for CVE-2021-43138", "url": "https://bugzilla.suse.com/1200480" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "important" } ], "title": "CVE-2021-43138" }, { "cve": "CVE-2021-43798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43798" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `\u003cgrafana_host_url\u003e/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43798", "url": "https://www.suse.com/security/cve/CVE-2021-43798" }, { "category": "external", "summary": "SUSE Bug 1193492 for CVE-2021-43798", "url": "https://bugzilla.suse.com/1193492" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "important" } ], "title": "CVE-2021-43798" }, { "cve": "CVE-2021-43813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43813" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 contains a directory traversal vulnerability for fully lowercase or fully uppercase .md files. The vulnerability is limited in scope, and only allows access to files with the extension .md to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Users should upgrade to patched versions 8.3.2 or 7.5.12. For users who cannot upgrade, running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths. Alternatively, for fully lowercase or fully uppercase .md files, users can block /api/plugins/.*/markdown/.* without losing any functionality beyond inlined plugin help text.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43813", "url": "https://www.suse.com/security/cve/CVE-2021-43813" }, { "category": "external", "summary": "SUSE Bug 1193686 for CVE-2021-43813", "url": "https://bugzilla.suse.com/1193686" }, { "category": "external", "summary": "SUSE Bug 1193688 for CVE-2021-43813", "url": "https://bugzilla.suse.com/1193688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2021-43813" }, { "cve": "CVE-2021-43815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43815" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 has a directory traversal for arbitrary .csv files. It only affects instances that have the developer testing tool called TestData DB data source enabled and configured. The vulnerability is limited in scope, and only allows access to files with the extension .csv to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Versions 8.3.2 and 7.5.12 contain a patch for this issue. There is a workaround available for users who cannot upgrade. Running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43815", "url": "https://www.suse.com/security/cve/CVE-2021-43815" }, { "category": "external", "summary": "SUSE Bug 1193686 for CVE-2021-43815", "url": "https://bugzilla.suse.com/1193686" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2021-43815" }, { "cve": "CVE-2022-0155", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0155" } ], "notes": [ { "category": "general", "text": "follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0155", "url": "https://www.suse.com/security/cve/CVE-2022-0155" }, { "category": "external", "summary": "SUSE Bug 1218844 for CVE-2022-0155", "url": "https://bugzilla.suse.com/1218844" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2022-0155" }, { "cve": "CVE-2022-23552", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23552" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Starting with the 8.1 branch and prior to versions 8.5.16, 9.2.10, and 9.3.4, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. The stored XSS vulnerability was possible because SVG files weren\u0027t properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. \n\nAn attacker needs to have the Editor role in order to change a panel to include either an external URL to a SVG-file containing JavaScript, or use the `data:` scheme to load an inline SVG-file containing JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. \n\nUsers may upgrade to version 8.5.16, 9.2.10, or 9.3.4 to receive a fix.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23552", "url": "https://www.suse.com/security/cve/CVE-2022-23552" }, { "category": "external", "summary": "SUSE Bug 1207749 for CVE-2022-23552", "url": "https://bugzilla.suse.com/1207749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "important" } ], "title": "CVE-2022-23552" }, { "cve": "CVE-2022-27664", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-27664" } ], "notes": [ { "category": "general", "text": "In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-27664", "url": "https://www.suse.com/security/cve/CVE-2022-27664" }, { "category": "external", "summary": "SUSE Bug 1203185 for CVE-2022-27664", "url": "https://bugzilla.suse.com/1203185" }, { "category": "external", "summary": "SUSE Bug 1203293 for CVE-2022-27664", "url": "https://bugzilla.suse.com/1203293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "important" } ], "title": "CVE-2022-27664" }, { "cve": "CVE-2022-29170", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29170" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn\u0027t call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29170", "url": "https://www.suse.com/security/cve/CVE-2022-29170" }, { "category": "external", "summary": "SUSE Bug 1199810 for CVE-2022-29170", "url": "https://bugzilla.suse.com/1199810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2022-29170" }, { "cve": "CVE-2022-31097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-31097" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Versions on the 8.x and 9.x branch prior to 9.0.3, 8.5.9, 8.4.10, and 8.3.10 are vulnerable to stored cross-site scripting via the Unified Alerting feature of Grafana. An attacker can exploit this vulnerability to escalate privilege from editor to admin by tricking an authenticated admin to click on a link. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch. As a workaround, it is possible to disable alerting or use legacy alerting.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-31097", "url": "https://www.suse.com/security/cve/CVE-2022-31097" }, { "category": "external", "summary": "SUSE Bug 1201535 for CVE-2022-31097", "url": "https://bugzilla.suse.com/1201535" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "important" } ], "title": "CVE-2022-31097" }, { "cve": "CVE-2022-31107", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-31107" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user\u0027s external user id is not already associated with an account in Grafana, the malicious user\u0027s email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will be able to log in to the target user\u0027s Grafana account. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch for this issue. As a workaround, concerned users can disable OAuth login to their Grafana instance, or ensure that all users authorized to log in via OAuth have a corresponding user account in Grafana linked to their email address.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-31107", "url": "https://www.suse.com/security/cve/CVE-2022-31107" }, { "category": "external", "summary": "SUSE Bug 1201539 for CVE-2022-31107", "url": "https://bugzilla.suse.com/1201539" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "important" } ], "title": "CVE-2022-31107" }, { "cve": "CVE-2022-31123", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-31123" } ], "notes": [ { "category": "general", "text": "Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-31123", "url": "https://www.suse.com/security/cve/CVE-2022-31123" }, { "category": "external", "summary": "SUSE Bug 1204302 for CVE-2022-31123", "url": "https://bugzilla.suse.com/1204302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2022-31123" }, { "cve": "CVE-2022-31130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-31130" } ], "notes": [ { "category": "general", "text": "Grafana is an open source observability and data visualization platform. Versions of Grafana for endpoints prior to 9.1.8 and 8.5.14 could leak authentication tokens to some destination plugins under some conditions. The vulnerability impacts data source and plugin proxy endpoints with authentication tokens. The destination plugin could receive a user\u0027s Grafana authentication token. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not use API keys, JWT authentication, or any HTTP Header based authentication.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-31130", "url": "https://www.suse.com/security/cve/CVE-2022-31130" }, { "category": "external", "summary": "SUSE Bug 1204305 for CVE-2022-31130", "url": "https://bugzilla.suse.com/1204305" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2022-31130" }, { "cve": "CVE-2022-32149", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-32149" } ], "notes": [ { "category": "general", "text": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-32149", "url": "https://www.suse.com/security/cve/CVE-2022-32149" }, { "category": "external", "summary": "SUSE Bug 1204501 for CVE-2022-32149", "url": "https://bugzilla.suse.com/1204501" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "important" } ], "title": "CVE-2022-32149" }, { "cve": "CVE-2022-35957", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-35957" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.1.6 and 8.5.13 are vulnerable to an escalation from admin to server admin when auth proxy is used, allowing an admin to take over the server admin account and gain full control of the grafana instance. All installations should be upgraded as soon as possible. As a workaround deactivate auth proxy following the instructions at: https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/auth-proxy/", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-35957", "url": "https://www.suse.com/security/cve/CVE-2022-35957" }, { "category": "external", "summary": "SUSE Bug 1203597 for CVE-2022-35957", "url": "https://bugzilla.suse.com/1203597" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2022-35957" }, { "cve": "CVE-2022-36062", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-36062" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In versions prior to 8.5.13, 9.0.9, and 9.1.6, Grafana is subject to Improper Preservation of Permissions resulting in privilege escalation on some folders where Admin is the only used permission. The vulnerability impacts Grafana instances where RBAC was disabled and enabled afterwards, as the migrations which are translating legacy folder permissions to RBAC permissions do not account for the scenario where the only user permission in the folder is Admin, as a result RBAC adds permissions for Editors and Viewers which allow them to edit and view folders accordingly. This issue has been patched in versions 8.5.13, 9.0.9, and 9.1.6. A workaround when the impacted folder/dashboard is known is to remove the additional permissions manually.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-36062", "url": "https://www.suse.com/security/cve/CVE-2022-36062" }, { "category": "external", "summary": "SUSE Bug 1203596 for CVE-2022-36062", "url": "https://bugzilla.suse.com/1203596" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2022-36062" }, { "cve": "CVE-2022-39201", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-39201" } ], "notes": [ { "category": "general", "text": "Grafana is an open source observability and data visualization platform. Starting with version 5.0.0-beta1 and prior to versions 8.5.14 and 9.1.8, Grafana could leak the authentication cookie of users to plugins. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. The destination plugin could receive a user\u0027s Grafana authentication cookie. Versions 9.1.8 and 8.5.14 contain a patch for this issue. There are no known workarounds.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-39201", "url": "https://www.suse.com/security/cve/CVE-2022-39201" }, { "category": "external", "summary": "SUSE Bug 1204303 for CVE-2022-39201", "url": "https://bugzilla.suse.com/1204303" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2022-39201" }, { "cve": "CVE-2022-39229", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-39229" } ], "notes": [ { "category": "general", "text": "Grafana is an open source data visualization platform for metrics, logs, and traces. Versions prior to 9.1.8 and 8.5.14 allow one user to block another user\u0027s login attempt by registering someone else\u0027e email address as a username. A Grafana user\u0027s username and email address are unique fields, that means no other user can have the same username or email address as another user. A user can have an email address as a username. However, the login system allows users to log in with either username or email address. Since Grafana allows a user to log in with either their username or email address, this creates an usual behavior where `user_1` can register with one email address and `user_2` can register their username as `user_1`\u0027s email address. This prevents `user_1` logging into the application since `user_1`\u0027s password won\u0027t match with `user_2`\u0027s email address. Versions 9.1.8 and 8.5.14 contain a patch. There are no workarounds for this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-39229", "url": "https://www.suse.com/security/cve/CVE-2022-39229" }, { "category": "external", "summary": "SUSE Bug 1204304 for CVE-2022-39229", "url": "https://bugzilla.suse.com/1204304" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "low" } ], "title": "CVE-2022-39229" }, { "cve": "CVE-2022-39306", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-39306" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.2.4, or 8.5.15 on the 8.X branch, are subject to Improper Input Validation. Grafana admins can invite other members to the organization they are an admin for. When admins add members to the organization, non existing users get an email invite, existing members are added directly to the organization. When an invite link is sent, it allows users to sign up with whatever username/email address the user chooses and become a member of the organization. This introduces a vulnerability which can be used with malicious intent. This issue is patched in version 9.2.4, and has been backported to 8.5.15. There are no known workarounds.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-39306", "url": "https://www.suse.com/security/cve/CVE-2022-39306" }, { "category": "external", "summary": "SUSE Bug 1205225 for CVE-2022-39306", "url": "https://bugzilla.suse.com/1205225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2022-39306" }, { "cve": "CVE-2022-39307", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-39307" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a \"user not found\" message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-39307", "url": "https://www.suse.com/security/cve/CVE-2022-39307" }, { "category": "external", "summary": "SUSE Bug 1205227 for CVE-2022-39307", "url": "https://bugzilla.suse.com/1205227" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2022-39307" }, { "cve": "CVE-2022-39324", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-39324" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker\u0027s injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-39324", "url": "https://www.suse.com/security/cve/CVE-2022-39324" }, { "category": "external", "summary": "SUSE Bug 1207750 for CVE-2022-39324", "url": "https://bugzilla.suse.com/1207750" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2022-39324" }, { "cve": "CVE-2022-41715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-41715" } ], "notes": [ { "category": "general", "text": "Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-41715", "url": "https://www.suse.com/security/cve/CVE-2022-41715" }, { "category": "external", "summary": "SUSE Bug 1204023 for CVE-2022-41715", "url": "https://bugzilla.suse.com/1204023" }, { "category": "external", "summary": "SUSE Bug 1208441 for CVE-2022-41715", "url": "https://bugzilla.suse.com/1208441" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41723", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-41723" } ], "notes": [ { "category": "general", "text": "A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-41723", "url": "https://www.suse.com/security/cve/CVE-2022-41723" }, { "category": "external", "summary": "SUSE Bug 1208270 for CVE-2022-41723", "url": "https://bugzilla.suse.com/1208270" }, { "category": "external", "summary": "SUSE Bug 1215588 for CVE-2022-41723", "url": "https://bugzilla.suse.com/1215588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "important" } ], "title": "CVE-2022-41723" }, { "cve": "CVE-2022-46146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-46146" } ], "notes": [ { "category": "general", "text": "Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users\u0027 bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-46146", "url": "https://www.suse.com/security/cve/CVE-2022-46146" }, { "category": "external", "summary": "SUSE Bug 1208046 for CVE-2022-46146", "url": "https://bugzilla.suse.com/1208046" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "important" } ], "title": "CVE-2022-46146" }, { "cve": "CVE-2023-0507", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0507" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. \n\nStarting with the 8.1 branch, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. \n\nThe stored XSS vulnerability was possible due to map attributions weren\u0027t properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. \n\nAn attacker needs to have the Editor role in order to change a panel to include a map attribution containing JavaScript. \n\nThis means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. \n\nUsers may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0507", "url": "https://www.suse.com/security/cve/CVE-2023-0507" }, { "category": "external", "summary": "SUSE Bug 1208821 for CVE-2023-0507", "url": "https://bugzilla.suse.com/1208821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "important" } ], "title": "CVE-2023-0507" }, { "cve": "CVE-2023-0594", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0594" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. \n\nStarting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization. \n\nThe stored XSS vulnerability was possible due the value of a span\u0027s attributes/resources were not properly sanitized and this will be rendered when the span\u0027s attributes/resources are expanded.\n\nAn attacker needs to have the Editor role in order to change the value of a trace view visualization to contain JavaScript. \n\nThis means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. \n\nUsers may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix. \n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0594", "url": "https://www.suse.com/security/cve/CVE-2023-0594" }, { "category": "external", "summary": "SUSE Bug 1208819 for CVE-2023-0594", "url": "https://bugzilla.suse.com/1208819" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "important" } ], "title": "CVE-2023-0594" }, { "cve": "CVE-2023-1387", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1387" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. \n\nStarting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. \n\nBy enabling the \"url_login\" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1387", "url": "https://www.suse.com/security/cve/CVE-2023-1387" }, { "category": "external", "summary": "SUSE Bug 1210907 for CVE-2023-1387", "url": "https://bugzilla.suse.com/1210907" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2023-1387" }, { "cve": "CVE-2023-1410", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1410" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. \n\nGrafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip. \n\nThe stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized.\n\nAn attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description. \n\n Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1410", "url": "https://www.suse.com/security/cve/CVE-2023-1410" }, { "category": "external", "summary": "SUSE Bug 1209645 for CVE-2023-1410", "url": "https://bugzilla.suse.com/1209645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2023-1410" }, { "cve": "CVE-2023-2183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2183" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. \n\nThe option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function.\n\nThis might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server.\n\nUsers may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2183", "url": "https://www.suse.com/security/cve/CVE-2023-2183" }, { "category": "external", "summary": "SUSE Bug 1212100 for CVE-2023-2183", "url": "https://bugzilla.suse.com/1212100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "moderate" } ], "title": "CVE-2023-2183" }, { "cve": "CVE-2023-2801", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2801" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. \n\nUsing public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance.\n\nThe only feature that uses mixed queries at the moment is public dashboards, but it\u0027s also possible to cause this by calling the query API directly.\n\nThis might enable malicious users to crash Grafana instances through that endpoint.\n\nUsers may upgrade to version 9.4.12 and 9.5.3 to receive a fix.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2801", "url": "https://www.suse.com/security/cve/CVE-2023-2801" }, { "category": "external", "summary": "SUSE Bug 1212099 for CVE-2023-2801", "url": "https://bugzilla.suse.com/1212099" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "important" } ], "title": "CVE-2023-2801" }, { "cve": "CVE-2023-3128", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3128" } ], "notes": [ { "category": "general", "text": "Grafana is validating Azure AD accounts based on the email claim. \n\nOn Azure AD, the profile email field is not unique and can be easily modified. \n\nThis leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3128", "url": "https://www.suse.com/security/cve/CVE-2023-3128" }, { "category": "external", "summary": "SUSE Bug 1212641 for CVE-2023-3128", "url": "https://bugzilla.suse.com/1212641" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.4, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15-BETA:ansible-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:ansible-doc-2.9.27-159000.3.9.1.noarch", "SUSE Manager Client Tools 15-BETA:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:firewalld-prometheus-config-0.1-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-boynux-squid_exporter-1.6-159000.4.9.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-159000.4.12.1.x86_64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.s390x", "SUSE Manager Client Tools 15-BETA:golang-github-prometheus-prometheus-2.45.0-159000.6.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.aarch64", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.ppc64le", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.s390x", "SUSE Manager Client Tools 15-BETA:grafana-9.5.8-159000.4.24.1.x86_64", "SUSE Manager Client Tools 15-BETA:mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.aarch64", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.ppc64le", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.s390x", "SUSE Manager Client Tools 15-BETA:prometheus-postgres_exporter-0.10.1-159000.3.6.1.x86_64", "SUSE Manager Client Tools 15-BETA:python3-hwdata-2.3.5-159000.5.13.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-mgr-push-5.0.1-159000.4.21.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-pyvmomi-6.7.3-159000.3.6.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-rhnlib-5.0.1-159000.6.30.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.aarch64", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.ppc64le", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.s390x", "SUSE Manager Client Tools 15-BETA:python3-uyuni-common-libs-5.0.1-159000.3.33.1.x86_64", "SUSE Manager Client Tools 15-BETA:spacecmd-5.0.1-159000.6.42.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-check-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-setup-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:spacewalk-client-tools-5.0.1-159000.6.48.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-salt-1.2.2-159000.5.9.1.noarch", "SUSE Manager Client Tools 15-BETA:supportutils-plugin-susemanager-client-5.0.1-159000.6.15.1.noarch", "SUSE Manager Client Tools 15-BETA:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:dracut-saltboot-0.1.1681904360.84ef141-159000.3.30.1.noarch", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:golang-github-QubitProducts-exporter_exporter-0.4.0-159000.4.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.aarch64", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.s390x", "SUSE Manager Client Tools Beta for SLE Micro 5:prometheus-blackbox_exporter-0.24.0-159000.3.6.1.x86_64", "SUSE Manager Client Tools Beta for SLE Micro 5:uyuni-proxy-systemd-services-5.0.1-159000.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:20:05Z", "details": "critical" } ], "title": "CVE-2023-3128" } ] }
suse-su-2024:0191-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security Beta update for SUSE Manager Client Tools", "title": "Title of the patch" }, { "category": "description", "text": "This update fixes the following issues:\n\ngolang-github-QubitProducts-exporter_exporter:\n\n- Exclude s390 arch \n- Adapted to build on Enterprise Linux.\n- Fix build for RedHat 7\n- Require Go \u003e= 1.14 also for CentOS\n- Add support for CentOS\n- Replace %{?systemd_requires} with %{?systemd_ordering}\n\ngolang-github-boynux-squid_exporter:\n\n- Exclude s390 architecture (gh#SUSE/spacewalk#19050)\n- Enhanced to build on Enterprise Linux 8.\n\ngolang-github-lusitaniae-apache_exporter:\n\n- Do not strip if SUSE Linux Enterprise 15 SP3\n- Exclude debug for RHEL \u003e= 8\n- Build with Go \u003e= 1.20 when the OS is not RHEL\n- Fix apparmor profile for SLE 12\n- Upgrade to version 1.0.0 (jsc#PED-5405)\n * Improved flag parsing\n * Added support for custom headers\n- Build using promu\n- Fix sandboxing options\n- Upgrade to version 0.13.4\n * CVE-2022-32149: Fix denial of service vulnerability (bsc#1204501)\n- Upgrade to version 0.13.3\n * CVE-2022-41723: Fix uncontrolled resource consumption (bsc#1208270)\n- Upgrade to version 0.13.1\n * Fix panic caused by missing flagConfig options\n- Upgrade to version 0.13.0\n * CVE-2022-46146: Fix authentication bypass vulnarability (bsc#1208046)\n- Corrected comment in AppArmor profile\n- Added AppArmor profile\n- Added sandboxing options to systemd service unit\n- Exclude s390 architecture (gh#SUSE/spacewalk#19050)\n- Update to upstream release 0.11.0 (jsc#SLE-24791)\n * Add TLS support\n * Switch to logger, please check --log.level and --log.format flags\n- Update to version 0.10.1\n * Bugfix: Reset ProxyBalancer metrics on each scrape to remove stale data\n- Update to version 0.10.0\n * Add Apache Proxy and other metrics\n- Update to version 0.8.0\n * Change commandline flags\n * Add metrics: Apache version, request duration total\n- Adapted to build on Enterprise Linux 8\n- Require building with Go 1.15\n- Add support for RedHat 8\n - Adjust dependencies on spec file \n - Disable dwarf compression in go build\n- Add support for Red Hat\n- Add %license macro for LICENSE file \n\ngolang-github-prometheus-alertmanager:\n\n- Do not create PIE for s390x architecture\n- Require Go 1.20 or newer for building\n- Remove not used build flags\n- Create position independent executables (PIE)\n- Disable striping the binaries only for SLE 15 SP3\n- Add System/Monitoring group tag\n- Rework service file to use obscpio\n * Run tar and recompress services at buildtime\n * Do not generate automatically changelog entries\n- Update to version 0.26.0 (jsc#PED-7353):\n https://github.com/prometheus/alertmanager/releases/tag/v0.26.0\n * CVE-2023-40577: Fix stored XSS via the /api/v1/alerts endpoint in the Alertmanager UI (bsc#1218838)\n * Configuration: Fix empty list of receivers and inhibit_rules would cause the alertmanager to crash\n * Templating: Fixed a race condition when using the title\n function. It is now race-safe\n * API: Fixed duplicate receiver names in the api/v2/receivers API\n endpoint\n * API: Attempting to delete a silence now returns the correct\n status code, 404 instead of 500\n * Clustering: Fixes a panic when tls_client_config is empty\n * Webhook: url is now marked as a secret. It will no longer show\n up in the logs as clear-text\n * Metrics: New label reason for\n alertmanager_notifications_failed_total metric to indicate the\n type of error of the alert delivery\n * Clustering: New flag --cluster.label, to help to block any\n traffic that is not meant for the cluster\n * Integrations: Add Microsoft Teams as a supported integration\n- Update to version 0.25.0:\n https://github.com/prometheus/alertmanager/releases/tag/v0.25.0\n * Fail configuration loading if api_key and api_key_file are\n defined at the same time\n * Fix the alertmanager_alerts metric to avoid counting resolved\n alerts as active. Also added a new alertmanager_marked_alerts\n metric that retain the old behavior\n * Trim contents of Slack API URLs when reading from files\n * amtool: Avoid panic when the label value matcher is empty\n * Fail configuration loading if api_url is empty for OpsGenie\n * Fix email template for resolved notifications\n * Add proxy_url support for OAuth2 in HTTP client configuration\n * Reload TLS certificate and key from disk when updated\n * Add Discord integration\n * Add Webex integration\n * Add min_version support to select the minimum TLS version in\n HTTP client configuration\n * Add max_version support to select the maximum TLS version in\n * Emit warning logs when truncating messages in notifications\n * Support HEAD method for the /-/healty and /-/ready endpoints\n * Add support for reading global and local SMTP passwords from\n files\n * UI: Add \u0027Link\u0027 button to alerts in list\n * UI: Allow to choose the first day of the week as Sunday or\n Monday\n- Update to version 0.24.0:\n https://github.com/prometheus/alertmanager/releases/tag/v0.24.0\n * Fix HTTP client configuration for the SNS receiver\n * Fix unclosed file descriptor after reading the silences\n snapshot file\n * Fix field names for mute_time_intervals in JSON marshaling\n * Ensure that the root route doesn\u0027t have any matchers\n * Truncate the message\u0027s title to 1024 chars to avoid hitting\n Slack limits\n * Fix the default HTML email template (email.default.html) to\n match with the canonical source\n * Detect SNS FIFO topic based on the rendered value\n * Avoid deleting and recreating a silence when an update is\n possible\n * api/v2: Return 200 OK when deleting an expired silence\n * amtool: Fix the silence\u0027s end date when adding a silence. The\n end date is (start date + duration) while it used to be\n (current time + duration). The new behavior is consistent with\n the update operation\n * Add the /api/v2 prefix to all endpoints in the OpenAPI\n specification and generated client code\n * Add --cluster.tls-config experimental flag to secure cluster\n traffic via mutual TLS\n * Add Telegram integration\n- CVE-2022-46146: Prevent authentication bypass via cache poisoning (bsc#1208051)\n- Do not include sources (bsc#1200725)\n\ngolang-github-prometheus-node_exporter:\n\n- Remove node_exporter-1.5.0.tar.gz\n- Execute tar and recompress service modules at buildtime\n- Update to 1.5.0 (jsc#PED-3578):\n * NOTE: This changes the Go runtime \u0027GOMAXPROCS\u0027 to 1. This is done to limit the\n concurrency of the exporter to 1 CPU thread at a time in order to avoid a\n race condition problem in the Linux kernel (#2500) and parallel IO issues\n on nodes with high numbers of CPUs/CPU threads (#1880).\n * [CHANGE] Default GOMAXPROCS to 1 #2530\n * [FEATURE] Add multiple listeners and systemd socket listener activation #2393\n * [ENHANCEMENT] Add RTNL version of netclass collector #2492, #2528\n * [BUGFIX] Fix hwmon label sanitizer #2504\n * [BUGFIX] Use native endianness when encoding InetDiagMsg #2508\n * [BUGFIX] Fix btrfs device stats always being zero #2516\n- Update to 1.4.1:\n * [BUGFIX] Fix diskstats exclude flags #2487\n * [SECURITY] CVE-2022-27191, CVE-2022-27664: Update go/x/crypto and go/x/net (bsc#1197284, bsc#1203185)\n * [SECURITY] CVE-2022-46146: Update exporter-toolkit (bsc#1208064)\n- Update to 1.4.0:\n * [CHANGE] Merge metrics descriptions in textfile collector #2475\n * [FEATURE] [node-mixin] Add darwin dashboard to mixin #2351\n * [FEATURE] Add \u0027isolated\u0027 metric on cpu collector on linux #2251\n * [FEATURE] Add cgroup summary collector #2408\n * [FEATURE] Add selinux collector #2205\n * [FEATURE] Add slab info collector #2376\n * [FEATURE] Add sysctl collector #2425\n * [FEATURE] Also track the CPU Spin time for OpenBSD systems #1971\n * [FEATURE] Add support for MacOS version #2471\n * [ENHANCEMENT] [node-mixin] Add missing selectors #2426\n * [ENHANCEMENT] [node-mixin] Change current datasource to grafana\u0027s default #2281\n * [ENHANCEMENT] [node-mixin] Change disk graph to disk table #2364\n * [ENHANCEMENT] [node-mixin] Change io time units to %util #2375\n * [ENHANCEMENT] Ad user_wired_bytes and laundry_bytes on *bsd #2266\n * [ENHANCEMENT] Add additional vm_stat memory metrics for darwin #2240\n * [ENHANCEMENT] Add device filter flags to arp collector #2254\n * [ENHANCEMENT] Add diskstats include and exclude device flags #2417\n * [ENHANCEMENT] Add node_softirqs_total metric #2221\n * [ENHANCEMENT] Add rapl zone name label option #2401\n * [ENHANCEMENT] Add slabinfo collector #1799\n * [ENHANCEMENT] Allow user to select port on NTP server to query #2270\n * [ENHANCEMENT] collector/diskstats: Add labels and metrics from udev #2404\n * [ENHANCEMENT] Enable builds against older macOS SDK #2327\n * [ENHANCEMENT] qdisk-linux: Add exclude and include flags for interface name #2432\n * [ENHANCEMENT] systemd: Expose systemd minor version #2282\n * [ENHANCEMENT] Use netlink for tcpstat collector #2322\n * [ENHANCEMENT] Use netlink to get netdev stats #2074\n * [ENHANCEMENT] Add additional perf counters for stalled frontend/backend cycles #2191\n * [ENHANCEMENT] Add btrfs device error stats #2193\n * [BUGFIX] [node-mixin] Fix fsSpaceAvailableCriticalThreshold and fsSpaceAvailableWarning #2352\n * [BUGFIX] Fix concurrency issue in ethtool collector #2289\n * [BUGFIX] Fix concurrency issue in netdev collector #2267\n * [BUGFIX] Fix diskstat reads and write metrics for disks with different sector sizes #2311\n * [BUGFIX] Fix iostat on macos broken by deprecation warning #2292\n * [BUGFIX] Fix NodeFileDescriptorLimit alerts #2340\n * [BUGFIX] Sanitize rapl zone names #2299\n * [BUGFIX] Add file descriptor close safely in test #2447\n * [BUGFIX] Fix race condition in os_release.go #2454\n * [BUGFIX] Skip ZFS IO metrics if their paths are missing #2451\n- BuildRequire go1.18 OR HIGHER (previously this was fixed to 1.14)\n- Update to 1.3.1\n * [BUGFIX] Handle nil CPU thermal power status on M1 #2218\n * [BUGFIX] bsd: Ignore filesystems flagged as MNT_IGNORE. #2227\n * [BUGFIX] Sanitize UTF-8 in dmi collector #2229\n- Exclude s390 arch.\n- Update spec file in order to make --version work (bsc#1196652)\n\ngolang-github-prometheus-prometheus:\n\n- Update to 2.45.0 (jsc#PED-5406):\n * [FEATURE] API: New limit parameter to limit the number of items\n returned by `/api/v1/status/tsdb` endpoint. \n * [FEATURE] Config: Add limits to global config. \n * [FEATURE] Consul SD: Added support for `path_prefix`. \n * [FEATURE] Native histograms: Add option to scrape both classic\n and native histograms. \n * [FEATURE] Native histograms: Added support for two more\n arithmetic operators `avg_over_time` and `sum_over_time`.\n * [FEATURE] Promtool: When providing the block id, only one block\n will be loaded and analyzed. \n * [FEATURE] Remote-write: New Azure ad configuration to support\n remote writing directly to Azure Monitor workspace. \n * [FEATURE] TSDB: Samples per chunk are now configurable with\n flag `storage.tsdb.samples-per-chunk`. By default set to its\n former value 120. \n * [ENHANCEMENT] Native histograms: bucket size can now be limited\n to avoid scrape fails. \n * [ENHANCEMENT] TSDB: Dropped series are now deleted from the WAL\n sooner. \n * [BUGFIX] Native histograms: ChunkSeries iterator now checks if\n a new sample can be appended to the open chunk. \n * [BUGFIX] Native histograms: Fix Histogram Appender\n `Appendable()` segfault. \n * [BUGFIX] Native histograms: Fix setting reset header to gauge\n histograms in seriesToChunkEncoder. \n * [BUGFIX] TSDB: Tombstone intervals are not modified after Get()\n call. \n * [BUGFIX] TSDB: Use path/filepath to set the WAL directory.\n- Update to 2.44.0:\n * [FEATURE] Remote-read: Handle native histograms. \n * [FEATURE] Promtool: Health and readiness check of prometheus\n server in CLI. \n * [FEATURE] PromQL: Add `query_samples_total` metric, the total\n number of samples loaded by all queries.\n * [ENHANCEMENT] Storage: Optimise buffer used to iterate through\n samples.\n * [ENHANCEMENT] Scrape: Reduce memory allocations on target\n labels.\n * [ENHANCEMENT] PromQL: Use faster heap method for `topk()` /\n `bottomk()`.\n * [ENHANCEMENT] Rules API: Allow filtering by rule name.\n * [ENHANCEMENT] Native Histograms: Various fixes and\n improvements.\n * [ENHANCEMENT] UI: Search of scraping pools is now\n case-insensitive.\n * [ENHANCEMENT] TSDB: Add an affirmative log message for\n successful WAL repair.\n * [BUGFIX] TSDB: Block compaction failed when shutting down.\n * [BUGFIX] TSDB: Out-of-order chunks could be ignored if the\n write-behind log was deleted.\n- Update to 2.43.1\n * [BUGFIX] Labels: Set() after Del() would be ignored, which\n broke some relabeling rules.\n- Update to 2.43.0:\n * [FEATURE] Promtool: Add HTTP client configuration to query\n commands.\n * [FEATURE] Scrape: Add `include_scrape_configs` to include\n scrape configs from different files.\n * [FEATURE] HTTP client: Add `no_proxy` to exclude URLs from\n proxied requests.\n * [FEATURE] HTTP client: Add `proxy_from_enviroment` to read\n proxies from env variables.\n * [ENHANCEMENT] API: Add support for setting lookback delta per\n query via the API.\n * [ENHANCEMENT] API: Change HTTP status code from 503/422 to 499\n if a request is canceled.\n * [ENHANCEMENT] Scrape: Allow exemplars for all metric types.\n * [ENHANCEMENT] TSDB: Add metrics for head chunks and WAL folders\n size.\n * [ENHANCEMENT] TSDB: Automatically remove incorrect snapshot\n with index that is ahead of WAL.\n * [ENHANCEMENT] TSDB: Improve Prometheus parser error outputs to\n be more comprehensible.\n * [ENHANCEMENT] UI: Scope `group by` labels to metric in\n autocompletion.\n * [BUGFIX] Scrape: Fix\n `prometheus_target_scrape_pool_target_limit` metric not set\n before reloading.\n * [BUGFIX] TSDB: Correctly update\n `prometheus_tsdb_head_chunks_removed_total` and\n `prometheus_tsdb_head_chunks` metrics when reading WAL.\n * [BUGFIX] TSDB: Use the correct unit (seconds) when recording\n out-of-order append deltas in the\n `prometheus_tsdb_sample_ooo_delta` metric.\n- Update to 2.42.0:\n This release comes with a bunch of feature coverage for native\n histograms and breaking changes.\n If you are trying native histograms already, we recommend you\n remove the `wal` directory when upgrading.\n Because the old WAL record for native histograms is not\n backward compatible in v2.42.0, this will lead to some data\n loss for the latest data.\n Additionally, if you scrape \u0027float histograms\u0027 or use recording\n rules on native histograms in v2.42.0 (which writes float\n histograms), it is a one-way street since older versions do not\n support float histograms.\n * [CHANGE] **breaking** TSDB: Changed WAL record format for the\n experimental native histograms.\n * [FEATURE] Add \u0027keep_firing_for\u0027 field to alerting rules.\n * [FEATURE] Promtool: Add support of selecting timeseries for\n TSDB dump.\n * [ENHANCEMENT] Agent: Native histogram support.\n * [ENHANCEMENT] Rules: Support native histograms in recording\n rules.\n * [ENHANCEMENT] SD: Add container ID as a meta label for pod\n targets for Kubernetes.\n * [ENHANCEMENT] SD: Add VM size label to azure service\n discovery.\n * [ENHANCEMENT] Support native histograms in federation.\n * [ENHANCEMENT] TSDB: Add gauge histogram support.\n * [ENHANCEMENT] TSDB/Scrape: Support FloatHistogram that\n represents buckets as float64 values.\n * [ENHANCEMENT] UI: Show individual scrape pools on /targets\n page.\n- Update to 2.41.0:\n * [FEATURE] Relabeling: Add keepequal and dropequal relabel\n actions.\n * [FEATURE] Add support for HTTP proxy headers. \n * [ENHANCEMENT] Reload private certificates when changed on disk.\n * [ENHANCEMENT] Add max_version to specify maximum TLS version in\n tls_config.\n * [ENHANCEMENT] Add goos and goarch labels to\n prometheus_build_info.\n * [ENHANCEMENT] SD: Add proxy support for EC2 and LightSail SDs.\n * [ENHANCEMENT] SD: Add new metric\n prometheus_sd_file_watcher_errors_total.\n * [ENHANCEMENT] Remote Read: Use a pool to speed up marshalling.\n * [ENHANCEMENT] TSDB: Improve handling of tombstoned chunks in\n iterators.\n * [ENHANCEMENT] TSDB: Optimize postings offset table reading.\n * [BUGFIX] Scrape: Validate the metric name, label names, and\n label values after relabeling.\n * [BUGFIX] Remote Write receiver and rule manager: Fix error\n handling.\n- Update to 2.40.7:\n * [BUGFIX] TSDB: Fix queries involving negative buckets of native\n histograms.\n- Update to 2.40.5:\n * [BUGFIX] TSDB: Fix queries involving native histograms due to\n improper reset of iterators.\n- Update to 2.40.3:\n * [BUGFIX] TSDB: Fix compaction after a deletion is called.\n- Update to 2.40.2:\n * [BUGFIX] UI: Fix black-on-black metric name color in dark mode.\n- Update to 2.40.1:\n * [BUGFIX] TSDB: Fix alignment for atomic int64 for 32 bit\n architecture.\n * [BUGFIX] Scrape: Fix accept headers.\n- Update to 2.40.0:\n * [FEATURE] Add experimental support for native histograms.\n Enable with the flag --enable-feature=native-histograms.\n * [FEATURE] SD: Add service discovery for OVHcloud.\n * [ENHANCEMENT] Kubernetes SD: Use protobuf encoding.\n * [ENHANCEMENT] TSDB: Use golang.org/x/exp/slices for improved\n sorting speed.\n * [ENHANCEMENT] Consul SD: Add enterprise admin partitions. Adds\n __meta_consul_partition label. Adds partition config in\n consul_sd_config.\n * [BUGFIX] API: Fix API error codes for /api/v1/labels and\n /api/v1/series.\n- Update to 2.39.1:\n * [BUGFIX] Rules: Fix notifier relabel changing the labels on\n active alerts.\n- Update to 2.39.0:\n * [FEATURE] experimental TSDB: Add support for ingesting\n out-of-order samples. This is configured via\n out_of_order_time_window field in the config file; check config\n file docs for more info.\n * [ENHANCEMENT] API: /-/healthy and /-/ready API calls now also\n respond to a HEAD request on top of existing GET support.\n * [ENHANCEMENT] PuppetDB SD: Add __meta_puppetdb_query label.\n * [ENHANCEMENT] AWS EC2 SD: Add __meta_ec2_region label.\n * [ENHANCEMENT] AWS Lightsail SD: Add __meta_lightsail_region\n label.\n * [ENHANCEMENT] Scrape: Optimise relabeling by re-using memory.\n * [ENHANCEMENT] TSDB: Improve WAL replay timings.\n * [ENHANCEMENT] TSDB: Optimise memory by not storing unnecessary\n data in the memory.\n * [ENHANCEMENT] TSDB: Allow overlapping blocks by default.\n --storage.tsdb.allow-overlapping-blocks now has no effect.\n * [ENHANCEMENT] UI: Click to copy label-value pair from query\n result to clipboard.\n * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a\n memory leak.\n * [BUGFIX] TSDB: Fix \u0027invalid magic number 0\u0027 error on Prometheus\n startup.\n * [BUGFIX] PromQL: Properly close file descriptor when logging\n unfinished queries.\n * [BUGFIX] Agent: Fix validation of flag options and prevent WAL\n from growing more than desired.\n- Update to 2.38.0:\n * [FEATURE]: Web: Add a /api/v1/format_query HTTP API endpoint\n that allows pretty-formatting PromQL expressions.\n * [FEATURE]: UI: Add support for formatting PromQL expressions in\n the UI.\n * [FEATURE]: DNS SD: Support MX records for discovering targets.\n * [FEATURE]: Templates: Add toTime() template function that\n allows converting sample timestamps to Go time.Time values.\n * [ENHANCEMENT]: Kubernetes SD: Add\n __meta_kubernetes_service_port_number meta label indicating the\n service port number.\n __meta_kubernetes_pod_container_image meta label indicating the\n container image.\n * [ENHANCEMENT]: PromQL: When a query panics, also log the query\n itself alongside the panic message.\n * [ENHANCEMENT]: UI: Tweak colors in the dark theme to improve\n the contrast ratio.\n * [ENHANCEMENT]: Web: Speed up calls to /api/v1/rules by avoiding\n locks and using atomic types instead.\n * [ENHANCEMENT]: Scrape: Add a no-default-scrape-port feature\n flag, which omits or removes any default HTTP (:80) or HTTPS\n (:443) ports in the target\u0027s scrape address.\n * [BUGFIX]: TSDB: In the WAL watcher metrics, expose the\n type=\u0027exemplar\u0027 label instead of type=\u0027unknown\u0027 for exemplar\n records.\n * [BUGFIX]: TSDB: Fix race condition around allocating series IDs\n during chunk snapshot loading.\n- Remove npm_licenses.tar.bz2 during \u0027make clean\u0027\n- Remove web-ui archives during \u0027make clean\u0027.\n- Require promu \u003e= 0.14.0 for building\n- Upgrade to version 2.37.6\n * Require Go 1.19\n- Upgrade to version 2.37.5\n * [SECURITY] Security upgrade from go and upstream dependencies\n that include security fixes to the net/http and os packages.\n- Upgrade to version 2.37.4\n * [SECURITY] CVE-2022-46146: Fix basic authentication bypass vulnerability (bsc#1208049, jsc#PED-3576)\n- Upgrade to version 2.37.3\n * [BUGFIX] CVE-2022-41715: Update our regexp library to fix upstream vulnerability (bnc#1204023)\n * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a\n memory leak.\n- Upgrade to version 2.37.2\n * [BUGFIX] TSDB: Fix \u0027invalid magic number 0\u0027 error on Prometheus\n startup.\n * [BUGFIX] Agent: Fix validation of flag options and prevent WAL\n from growing more than desired.\n- Upgrade to version 2.37.1\n * [BUGFIX] Properly close file descriptor when logging unfinished\n queries.\n * [BUGFIX] TSDB: In the WAL watcher metrics, expose the\n- Upgrade to version 2.37.0\n * [FEATURE] Nomad SD: New service discovery for Nomad built-in\n service discovery.\n * [ENHANCEMENT] Kubernetes SD: Allow attaching node labels for\n endpoint role.\n * [ENHANCEMENT] PromQL: Optimise creation of signature\n with/without labels.\n * [ENHANCEMENT] TSDB: Memory optimizations.\n * [ENHANCEMENT] TSDB: Reduce sleep time when reading WAL.\n * [ENHANCEMENT] OAuth2: Add appropriate timeouts and User-Agent\n header.\n * [BUGFIX] Alerting: Fix Alertmanager targets not being updated\n when alerts were queued.\n * [BUGFIX] Hetzner SD: Make authentication files relative to\n Prometheus config file.\n * [BUGFIX] Promtool: Fix promtool check config not erroring\n properly on failures.\n * [BUGFIX] Scrape: Keep relabeled scrape interval and timeout on\n reloads.\n * [BUGFIX] TSDB: Don\u0027t increment\n prometheus_tsdb_compactions_failed_total when context is\n canceled.\n * [BUGFIX] TSDB: Fix panic if series is not found when deleting\n series.\n * [BUGFIX] TSDB: Increase\n prometheus_tsdb_mmap_chunk_corruptions_total on out of sequence\n errors.\n * [BUGFIX] Uyuni SD: Make authentication files relative to\n Prometheus configuration file and fix default configuration\n values.\n- Upgrade to version 2.36.2\n * [BUGFIX] Fix serving of static assets like fonts and favicon.\n- Upgrade to version 2.36.1\n * [BUGFIX] promtool: Add --lint-fatal option.\n- Upgrade to version 2.36.0\n * [FEATURE] Add lowercase and uppercase relabel action.\n * [FEATURE] SD: Add IONOS Cloud integration.\n * [FEATURE] SD: Add Vultr integration.\n * [FEATURE] SD: Add Linode SD failure count metric.\n * [FEATURE] Add prometheus_ready metric.\n * [ENHANCEMENT] Add stripDomain to template function.\n * [ENHANCEMENT] UI: Enable active search through dropped targets.\n * [ENHANCEMENT] promtool: support matchers when querying label\n * [ENHANCEMENT] Add agent mode identifier.\n * [BUGFIX] Changing TotalQueryableSamples from int to int64.\n * [BUGFIX] tsdb/agent: Ignore duplicate exemplars.\n * [BUGFIX] TSDB: Fix chunk overflow appending samples at a\n variable rate.\n * [BUGFIX] Stop rule manager before TSDB is stopped.\n- Upgrade to version 2.35.0\n * [CHANGE] TSDB: Delete *.tmp WAL files when Prometheus starts.\n * [CHANGE] promtool: Add new flag --lint (enabled by default) for\n the commands check rules and check config, resulting in a new\n exit code (3) for linter errors.\n * [FEATURE] Support for automatically setting the variable\n GOMAXPROCS to the container CPU limit. Enable with the flag\n --enable-feature=auto-gomaxprocs.\n * [FEATURE] PromQL: Extend statistics with total and peak number\n of samples in a query. Additionally, per-step statistics are\n available with --enable-feature=promql-per-step-stats and using\n stats=all in the query API. Enable with the flag\n --enable-feature=per-step-stats.\n * [ENHANCEMENT] TSDB: more efficient sorting of postings read from\n WAL at startup.\n * [ENHANCEMENT] Azure SD: Add metric to track Azure SD failures.\n * [ENHANCEMENT] Azure SD: Add an optional resource_group\n configuration.\n * [ENHANCEMENT] Kubernetes SD: Support discovery.k8s.io/v1\n EndpointSlice (previously only discovery.k8s.io/v1beta1\n EndpointSlice was supported).\n * [ENHANCEMENT] Kubernetes SD: Allow attaching node metadata to\n discovered pods.\n * [ENHANCEMENT] OAuth2: Support for using a proxy URL to fetch\n OAuth2 tokens.\n * [ENHANCEMENT] Configuration: Add the ability to disable HTTP2.\n * [ENHANCEMENT] Config: Support overriding minimum TLS version.\n * [BUGFIX] Kubernetes SD: Explicitly include gcp auth from k8s.io.\n * [BUGFIX] Fix OpenMetrics parser to sort uppercase labels\n correctly.\n * [BUGFIX] UI: Fix scrape interval and duration tooltip not\n showing on target page.\n * [BUGFIX] Tracing/GRPC: Set TLS credentials only when insecure is\n false.\n * [BUGFIX] Agent: Fix ID collision when loading a WAL with\n multiple segments.\n * [BUGFIX] Remote-write: Fix a deadlock between Batch and flushing\n the queue.\n- Upgrade to version 2.34.0\n * [CHANGE] UI: Classic UI removed.\n * [CHANGE] Tracing: Migrate from Jaeger to OpenTelemetry based\n tracing.\n * [ENHANCEMENT] TSDB: Disable the chunk write queue by default and\n allow configuration with the experimental flag\n --storage.tsdb.head-chunks-write-queue-size.\n * [ENHANCEMENT] HTTP SD: Add a failure counter.\n * [ENHANCEMENT] Azure SD: Set Prometheus User-Agent on requests.\n * [ENHANCEMENT] Uyuni SD: Reduce the number of logins to Uyuni.\n * [ENHANCEMENT] Scrape: Log when an invalid media type is\n encountered during a scrape.\n * [ENHANCEMENT] Scrape: Accept\n application/openmetrics-text;version=1.0.0 in addition to\n version=0.0.1.\n * [ENHANCEMENT] Remote-read: Add an option to not use external\n labels as selectors for remote read.\n * [ENHANCEMENT] UI: Optimize the alerts page and add a search bar.\n * [ENHANCEMENT] UI: Improve graph colors that were hard to see.\n * [ENHANCEMENT] Config: Allow escaping of $ with $$ when using\n environment variables with external labels.\n * [BUGFIX] PromQL: Properly return an error from\n histogram_quantile when metrics have the same labelset.\n * [BUGFIX] UI: Fix bug that sets the range input to the\n resolution.\n * [BUGFIX] TSDB: Fix a query panic when\n memory-snapshot-on-shutdown is enabled.\n * [BUGFIX] Parser: Specify type in metadata parser errors.\n * [BUGFIX] Scrape: Fix label limit changes not applying.\n- Upgrade to version 2.33.5\n * [BUGFIX] Remote-write: Fix deadlock between adding to queue and\n getting batch.\n- Upgrade to version 2.33.4\n * [BUGFIX] TSDB: Fix panic when m-mapping head chunks onto the\n disk.\n- Upgrade to version 2.33.3\n * [BUGFIX] Azure SD: Fix a regression when public IP Address isn\u0027t\n set.\n- Upgrade to version 2.33.2\n * [BUGFIX] Azure SD: Fix panic when public IP Address isn\u0027t set.\n * [BUGFIX] Remote-write: Fix deadlock when stopping a shard.\n- Upgrade to version 2.33.1\n * [BUGFIX] SD: Fix no such file or directory in K8s SD when not\n running inside K8s.\n- Upgrade to version 2.33.0\n * [CHANGE] PromQL: Promote negative offset and @ modifer to stable\n features.\n * [CHANGE] Web: Promote remote-write-receiver to stable.\n * [FEATURE] Config: Add stripPort template function.\n * [FEATURE] Promtool: Add cardinality analysis to check metrics,\n enabled by flag --extended.\n * [FEATURE] SD: Enable target discovery in own K8s namespace.\n * [FEATURE] SD: Add provider ID label in K8s SD.\n * [FEATURE] Web: Add limit field to the rules API.\n * [ENHANCEMENT] Remote-write: Avoid allocations by buffering\n concrete structs instead of interfaces.\n * [ENHANCEMENT] Remote-write: Log time series details for\n out-of-order samples in remote write receiver.\n * [ENHANCEMENT] Remote-write: Shard up more when backlogged.\n * [ENHANCEMENT] TSDB: Use simpler map key to improve exemplar\n ingest performance.\n * [ENHANCEMENT] TSDB: Avoid allocations when popping from the\n intersected postings heap.\n * [ENHANCEMENT] TSDB: Make chunk writing non-blocking, avoiding\n latency spikes in remote-write.\n * [ENHANCEMENT] TSDB: Improve label matching performance.\n * [ENHANCEMENT] UI: Optimize the service discovery page and add a search bar.\n * [ENHANCEMENT] UI: Optimize the target page and add a search bar.\n * [BUGFIX] Promtool: Make exit codes more consistent.\n * [BUGFIX] Promtool: Fix flakiness of rule testing.\n * [BUGFIX] Remote-write: Update\n prometheus_remote_storage_queue_highest_sent_timestamp_seconds\n metric when write irrecoverably fails.\n * [BUGFIX] Storage: Avoid panic in BufferedSeriesIterator.\n * [BUGFIX] TSDB: CompactBlockMetas should produce correct\n mint/maxt for overlapping blocks.\n * [BUGFIX] TSDB: Fix logging of exemplar storage size.\n * [BUGFIX] UI: Fix overlapping click targets for the alert state\n checkboxes.\n * [BUGFIX] UI: Fix Unhealthy filter on target page to actually\n display only Unhealthy targets.\n * [BUGFIX] UI: Fix autocompletion when expression is empty.\n * [BUGFIX] TSDB: Fix deadlock from simultaneous GC and write.\n- CVE-2022-46146: Fix authentication bypass by updating Prometheus Exporter Toolkit\n to version 0.7.3 (bsc#1208049)\n- CVE-2022-41723: Fix uncontrolled resource consumption by updating Go to version\n 1.20.1 (bsc#1208298)\n\ngolang-github-prometheus-promu:\n\n- Always set user and host build metadata to constant string to\n achieve reproducible builds (compare reproducible-builds.org)\n- Add 0001-do_not_discover_user_host_for_reproducible_builds.patch\n- Require Go \u003e= 1.19 for building\n- Require Go \u003e= 1.18 for building Red Hat packages\n- Update to version 0.14.0 (jsc#PED-3576):\n * Add the ability to override tags per GOOS\n * Remove ioutil\n * Update common Prometheus files (#232) (#224)\n * Validate environment variable value\n * Set build date from SOURCE_DATE_EPOCH\n- Update to Go 1.18\n- Exclude s390 architecture.\n- Set build date from last changelog modification (bsc#1047218)\n- Adapted for Enterprise Linux build.\n- Build requires Go 1.15\n * Make extldflags extensible by configuration. #125\n * Avoid bind-mounting to allow building with a remote docker engine #95\n- Update to 0.2.0\n + Features:\n * Adding changes to support s390x\n * Add option to disable static linking\n * Add support for 32bit MIPS.\n * Added check_licenses Command to Promu\n + Enhancements:\n * Allow to customize nested options via env variables\n * Bump Go version to 1.11\n * Add warning if promu info is unable to determine repo info\n + Bug Fixes:\n * Fix build on SmartOS by not setting gcc\u0027s -static flag\n * Fix git repository url parsing\n- Update to 0.1.0\n- Initial version\n\ngrafana:\n\n- Update to version 9.5.8:\n * Please, check the release notes for further details.\n * Security fixes provided in this and previous versions:\n * CVE-2023-3128: Authentication bypass using Azure AD OAuth (bsc#1212641, jsc#PED-3694)\n * CVE-2023-2801: Prevent crash while executing concurrent mixed queries (bsc#1212099)\n * CVE-2023-2183: Require alert.notifications:write permissions to test receivers and templates (bsc#1212100)\n * CVE-2023-1387: JWT URL-login flow leaks token to data sources through request parameter in proxy \n requests (bsc#1210907, jsc#PED-3694)\n * CVE-2023-1410: Stored XSS in Graphite FunctionDescription tooltip (bsc#1209645)\n * CVE-2020-7753: Regular Expression Denial of Service (ReDoS) in trim function (bsc#1218843)\n * CVE-2021-3807: Regular expressionDdenial of Service (ReDoS) matching ANSI escape codes (bsc#1192154)\n * CVE-2021-3918: Improperly Controlled Modification of Object Prototype Attributes (bsc#1192696)\n * CVE-2021-43138: A malicious user can obtain privileges via the mapValues() method (bsc#1200480)\n * CVE-2022-0155: Exposure of Private Personal Information to an Unauthorized Actor (bsc#1218844)\n * CVE-2022-31107: OAuth account takeover (bsc#1201539)\n * CVE-2022-31097: Stored XSS vulnerability (bsc#1201535)\n * CVE-2023-1410: Fix XSS in Graphite functions tooltip (bsc#1209645)\n * CVE-2023-0507: Apply attribute sanitation to GeomapPanel (bsc#1208821)\n * CVE-2023-0594: Avoid storing XSS in TraceView panel (bsc#1208819)\n * CVE-2022-46146: Fix basic authentication bypass by updating the exporter toolkit to \n version 0.7.3 (bsc#1208065)\n * CVE-2022-41723: Require Go 1.19 or newer (bsc#1208293)\n * CVE-2022-23552: SVG: Add dompurify preprocessor step (bsc#1207749)\n * CVE-2022-39324: Snapshots: Fix originalUrl spoof security issue (bsc#1207750)\n * CVE-2022-39306: Fix for privilege escalation (bsc#1205225)\n * CVE-2022-39307: Omit error from http response when user does not\n exists (bsc#1205227)\n * CVE-2022-39201: Fix do not forward login cookie in outgoing requests (bsc#1204303)\n * CVE-2022-31130: Make proxy endpoints not leak sensitive HTTP headers (bsc#1204305)\n * CVE-2022-31123: Fix plugin signature bypass (bsc#1204302)\n * CVE-2022-39229: Fix blocknig other users from signing in (bsc#1204304)\n * CVE-2022-36062: RBAC folders/dashboards privilege escalation (bsc#1203596, jsc#PED-2145)\n * CVE-2022-35957: Escalation from admin to server admin when auth proxy is used (bsc#1203597, jsc#PED-2145)\n * CVE-2022-31107: OAuth account takeover (bsc#1201539)\n * CVE-2022-31097: Stored XSS vulnerability (bsc#1201535)\n * CVE-2022-29170: Request security bypass via malicious redirect (bsc#1199810)\n * CVE-2022-31097: XSS vulnerability in the Unified Alerting (bsc#1201535)\n * CVE-2022-31107: OAuth account takeover vulnerability (bsc#1201539)\n * CVE-2022-21702: XSS vulnerability in handling data sources (bsc#1195726, jsc#SLE-23439, jsc#SLE-23422, jsc#SLE-24565)\n * CVE-2022-21703: Cross-origin request forgery vulnerability (bsc#1195727)\n * CVE-2022-21713: Insecure Direct Object Reference vulnerability in Teams API (bsc#1195728)\n * CVE-2022-21673: GetUserInfo: return an error if no user was found (bsc#1194873)\n * CVE-2021-43813: Directory traversal vulnerability for .md files (bsc#1193688)\n * CVE-2021-43815: Directory traversal for .csv files (bsc#1193686)\n * CVE-2021-43798: arbitrary file read in the graph native plugin (bsc#1193492)\n * CVE-2021-43798: Arbitrary file read in the graph native plugin (bsc#1193492)\n * CVE-2021-41244: Grafana 8.2.4 released with security fixes (bsc#1192763)\n * Security: Fixes CVE-2021-41174, bsc#1192383.\n * Security: Update dependencies to fix CVE-2021-36222, bsc#1188571.\n\nkiwi-desc-saltboot:\n\n- Update to version 0.1.1687520761.cefb248\n * Add osimage cert package to bootstrap for\n SUSE Linux Enterprise 12 images (bsc#1204089)\n- Update to version 0.1.1673279145.e7616bd\n * Add failsafe stop file when salt-minion does not stop (bsc#1172110)\n- Update to version 0.1.1661440542.6cbe0da\n * Use standard susemanager.conf\n * Use salt bundle\n * Add support fo VirtIO disks\n\nmgr-push:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.6-1\n * Remove unused makefiles\n- Version 4.4.5-1\n * Use http to connect to localhost server\n * Use bundle CA certificate in rhnpush\n- Version 4.4.4-1\n * remove pylint check at build time\n- Version 4.4.3-1\n * Ensure installation of make for building\n- Version 4.4.2-1\n * Update translation strings\n- Version 4.4.1-1\n * Bump version to 4.4.0\n\nprometheus-blackbox_exporter:\n\n- Use obscpio for go modules service\n- Set version number\n- Set build date from SOURCE_DATE_EPOCH\n- Update to 0.24.0 (bsc#1212279, jsc#PED-4556)\n * Requires go1.19\n- Avoid empty validation script\n- Add rc symlink for backwards compatibility\n- Fix authentication bypass via cache poisoning\n (CVE-2022-46146, bsc#1208062)\n- Add `min_version` parameter of `tls_config` to allow enabling\n TLS 1.0 and 1.1 (bsc#1209113)\n- On SUSE Linux Enterprise build always with Go \u003e= 1.19 (bsc#1203599)\n- Build with go1.18 only for SLE-15-SP3 and \n build with \u003e= go1.19 on higher SP (bsc#1203599)\n- Require go1.18 (bsc#1203599, GH#19127)\n- Exclude s390 arch\n- Fix %pre section to avoid empty content\n- Updated to allow building on older rpmbuild.\n- Enhanced to build on Enterprise Linux 8\n\nprometheus-postgres_exporter:\n\n- Remove duplicated call to systemd requirements\n- Do not build debug if RHEL \u003e= 8\n- Do not strip if SUSE Linux Enterprise 15 SP3\n- Build at least with with Go \u003e= 1.18 on RHEL\n- Build with Go \u003e= 1.20 elsewhere\n- Adapt the systemd service security configuration\n to be able to start it on RHEL systems and clones\n- Create the prometheus user for RHEL systems and clones\n- Add 0001-Update-prometheus-exporter-toolkit-to-0.7.3.patch\n * Fix authentication bypass via cache poisoning\n (CVE-2022-46146, bsc#1208060)\n- Fix _service to pull correct version\n- Use go_modules source service\n- Upgrade to version 0.10.1:\n * Fix broken log-level for values other than debug (bsc#1208965)\n- Version/release lines above first usage of those macros.\n gh#uyuni-project/uyuni#5418\n- Prevent empty %pre section\n- Exclude s390 builds \n- Updated for RHEL8.\n\npython-hwdata:\n\n- Declare the LICENSE file as license and not doc\n\nrhnlib:\n\n- Version 5.0.1-1\n * Specify a packager for Debian like distros\n- Version 4.4.6-1\n * Remove unused makefiles\n- Version 4.4.5-1\n * Use bundle CA certificate in rhnpush\n- Version 4.4.4-1\n * Only use TLSv1+ for SSL connections\n- Version 4.4.3-1\n * Ensure installation of make for building\n- Version 4.4.2-1\n * Don\u0027t get stuck at the end of SSL transfers (bsc#1204032)\n- Version 4.4.1-1\n * Bump version to 4.4.0\n\nspacecmd:\n\n- Version 5.0.1-1\n * Use localhost without ssl when running on the server\n- Version 4.4.10-1\n * Update translation strings\n- Version 4.4.9-1\n- Version 4.4.8-1\n * Add spacecmd function: cryptokey_update\n * Bypass traditional systems check on older SUMA instances (bsc#1208612)\n * fix argument parsing of distribution_update (bsc#1210458)\n- Version 4.4.7-1\n * remove pylint check at build time\n * Display activation key details after executing the corresponding command (bsc#1208719)\n * Show targetted packages before actually removing them (bsc#1207830)\n- Version 4.4.6-1\n * Fix spacecmd not showing any output for softwarechannel_diff \n and softwarechannel_errata_diff (bsc#1207352)\n- Version 4.4.5-1\n * Prevent string api parameters to be parsed as dates if not in\n ISO-8601 format (bsc#1205759)\n * Add python-dateutil dependency, required to process date values in\n spacecmd api calls\n * Remove python3-simplejson dependency\n- Version 4.4.4-1\n * Correctly understand \u0027ssm\u0027 keyword on scap scheduling\n * Add vendor_advisory information to errata_details call (bsc#1205207)\n * Change default port of \u0027Containerized Proxy configuration\u0027 8022\n- Version 4.4.3-1\n * Added two missing options to schedule product migration: allow-vendor-change\n and remove-products-without-successor (bsc#1204126)\n * Changed schedule product migration to use the correct API method\n * Fix dict_keys not supporting indexing in systems_setconfigchannelorger\n * Added a warning message for traditional stack deprecation\n * Remove \u0027Undefined return code\u0027 from debug messages (bsc#1203283)\n- Version 4.4.2-1\n * Stop always showing help for valid proxy_container_config calls\n- Version 4.4.1-1\n * Process date values in spacecmd api calls (bsc#1198903)\n * Improve Proxy FQDN hint message\n- Version 4.3.14-1\n * Fix missing argument on system_listmigrationtargets (bsc#1201003)\n * Show correct help on calling kickstart_importjson with no arguments\n * Fix tracebacks on spacecmd kickstart_export (bsc#1200591)\n * Change proxy container config default filename to end with tar.gz\n- Version 4.3.13-1\n * Update translation strings\n- Version 4.3.12-1\n * Update translation strings\n- Version 4.3.11-1\n * on full system update call schedulePackageUpdate API (bsc#1197507)\n\nspacewalk-client-tools:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.7-1\n * Remove unused and deprecated/removed platform.dist import.\n- Version 4.4.6-1\n * Update translation strings\n * Tito requires to list the package source as %{name}-%{version}.tar.gz\n- Version 4.4.5-1\n * remove mgr-virtualization usage\n * remove dependency to suseRegisterInfo\n- Version 4.4.4-1\n * Update translation strings\n- Version 4.4.3-1\n * Update translation strings\n- Version 4.4.2-1\n * Update translation strings\n- Version 4.4.1-1\n * Update translation strings\n- Version 4.3.11-1\n * Update translation strings\n- Version 4.3.10-1\n\nsupportutils-plugin-salt:\n\n- Update to version 1.2.2\n * Remove possible passwords from Salt configuration files (bsc#1201059)\n- Update to version 1.2.1\n * Remove ERROR messages on Salt client systems\n- Declare the LICENSE file as license and not doc\n- Update to version 1.2.0\n * Add support for Salt Bundle\n\nsupportutils-plugin-susemanager-client:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.2-1\n * write configured crypto-policy in supportconfig\n * add cloud and payg checks\n- Version 4.4.1-1\n * Bump version to 4.4.0\n- Version 4.3.2-1\n * Add proxy containers config and logs\n\nuyuni-common-libs:\n\n- Version 5.0.1-1\n * Bump version to 5.0.0\n- Version 4.4.4-1\n * Workaround for python3-debian bug about collecting control file (bsc#1211525, bsc#1208692)\n * Accept missing rhn.conf file\n * Use context manager for apache users in fileutils.py.\n- Version 4.4.3-1\n * Ensure installation of make for building.\n * Use versioned Python during packaging.\n- Version 4.4.2-1\n * unify user notification code on java side\n- Version 4.4.1-1\n * Do not allow creating path if nonexistent user or group in fileutils.\n- Version 4.3.5-1\n * Fix reposync issue about \u0027rpm.hdr\u0027 object has no attribute \u0027get\u0027\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-191,SUSE-SLE-Manager-Tools-12-BETA-2024-191", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0191-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:0191-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240191-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:0191-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" }, { "category": "self", "summary": "SUSE Bug 1047218", "url": "https://bugzilla.suse.com/1047218" }, { "category": "self", "summary": "SUSE Bug 1172110", "url": "https://bugzilla.suse.com/1172110" }, { "category": "self", "summary": "SUSE Bug 1188571", "url": "https://bugzilla.suse.com/1188571" }, { "category": "self", "summary": "SUSE Bug 1189520", "url": "https://bugzilla.suse.com/1189520" }, { "category": "self", "summary": "SUSE Bug 1191454", "url": "https://bugzilla.suse.com/1191454" }, { "category": "self", "summary": "SUSE Bug 1192154", "url": "https://bugzilla.suse.com/1192154" }, { "category": "self", "summary": "SUSE Bug 1192383", "url": "https://bugzilla.suse.com/1192383" }, { "category": "self", "summary": "SUSE Bug 1192696", "url": "https://bugzilla.suse.com/1192696" }, { "category": "self", "summary": "SUSE Bug 1192763", "url": "https://bugzilla.suse.com/1192763" }, { "category": "self", "summary": "SUSE Bug 1193492", "url": "https://bugzilla.suse.com/1193492" }, { "category": "self", "summary": "SUSE Bug 1193686", "url": "https://bugzilla.suse.com/1193686" }, { "category": "self", "summary": "SUSE Bug 1193688", "url": "https://bugzilla.suse.com/1193688" }, { "category": "self", "summary": "SUSE Bug 1194873", "url": "https://bugzilla.suse.com/1194873" }, { "category": "self", "summary": "SUSE Bug 1195726", "url": "https://bugzilla.suse.com/1195726" }, { "category": "self", "summary": "SUSE Bug 1195727", "url": "https://bugzilla.suse.com/1195727" }, { "category": "self", "summary": "SUSE Bug 1195728", "url": "https://bugzilla.suse.com/1195728" }, { "category": "self", "summary": "SUSE Bug 1196338", "url": "https://bugzilla.suse.com/1196338" }, { "category": "self", "summary": "SUSE Bug 1196652", "url": "https://bugzilla.suse.com/1196652" }, { "category": "self", "summary": "SUSE Bug 1197507", "url": "https://bugzilla.suse.com/1197507" }, { "category": "self", "summary": "SUSE Bug 1198903", "url": "https://bugzilla.suse.com/1198903" }, { "category": "self", "summary": "SUSE Bug 1199810", "url": "https://bugzilla.suse.com/1199810" }, { "category": "self", "summary": "SUSE Bug 1200480", "url": "https://bugzilla.suse.com/1200480" }, { "category": "self", "summary": "SUSE Bug 1200591", "url": "https://bugzilla.suse.com/1200591" }, { "category": "self", "summary": "SUSE Bug 1200725", "url": "https://bugzilla.suse.com/1200725" }, { "category": "self", "summary": "SUSE Bug 1201003", "url": "https://bugzilla.suse.com/1201003" }, { "category": "self", "summary": "SUSE Bug 1201059", "url": "https://bugzilla.suse.com/1201059" }, { "category": "self", "summary": "SUSE Bug 1201535", "url": "https://bugzilla.suse.com/1201535" }, { "category": "self", "summary": "SUSE Bug 1201539", "url": "https://bugzilla.suse.com/1201539" }, { "category": "self", "summary": "SUSE Bug 1203283", "url": "https://bugzilla.suse.com/1203283" }, { "category": "self", "summary": "SUSE Bug 1203596", "url": "https://bugzilla.suse.com/1203596" }, { "category": "self", "summary": "SUSE Bug 1203597", "url": "https://bugzilla.suse.com/1203597" }, { "category": "self", "summary": "SUSE Bug 1203599", "url": "https://bugzilla.suse.com/1203599" }, { "category": "self", "summary": "SUSE Bug 1204032", "url": "https://bugzilla.suse.com/1204032" }, { "category": "self", "summary": "SUSE Bug 1204089", "url": "https://bugzilla.suse.com/1204089" }, { "category": "self", "summary": "SUSE Bug 1204126", "url": "https://bugzilla.suse.com/1204126" }, { "category": "self", "summary": "SUSE Bug 1204302", "url": "https://bugzilla.suse.com/1204302" }, { "category": "self", "summary": "SUSE Bug 1204303", "url": "https://bugzilla.suse.com/1204303" }, { "category": "self", "summary": "SUSE Bug 1204304", "url": "https://bugzilla.suse.com/1204304" }, { "category": "self", "summary": "SUSE Bug 1204305", "url": "https://bugzilla.suse.com/1204305" }, { "category": "self", "summary": "SUSE Bug 1204501", "url": "https://bugzilla.suse.com/1204501" }, { "category": "self", "summary": "SUSE Bug 1205207", "url": "https://bugzilla.suse.com/1205207" }, { "category": "self", "summary": "SUSE Bug 1205225", "url": "https://bugzilla.suse.com/1205225" }, { "category": "self", "summary": "SUSE Bug 1205227", "url": "https://bugzilla.suse.com/1205227" }, { "category": "self", "summary": "SUSE Bug 1205759", "url": "https://bugzilla.suse.com/1205759" }, { "category": "self", "summary": "SUSE Bug 1207352", "url": "https://bugzilla.suse.com/1207352" }, { "category": "self", "summary": "SUSE Bug 1207749", "url": "https://bugzilla.suse.com/1207749" }, { "category": "self", "summary": "SUSE Bug 1207750", "url": "https://bugzilla.suse.com/1207750" }, { "category": "self", "summary": "SUSE Bug 1207830", "url": "https://bugzilla.suse.com/1207830" }, { "category": "self", "summary": "SUSE Bug 1208046", "url": "https://bugzilla.suse.com/1208046" }, { "category": "self", "summary": "SUSE Bug 1208049", "url": "https://bugzilla.suse.com/1208049" }, { "category": "self", "summary": "SUSE Bug 1208051", "url": "https://bugzilla.suse.com/1208051" }, { "category": "self", "summary": "SUSE Bug 1208060", "url": "https://bugzilla.suse.com/1208060" }, { "category": "self", "summary": "SUSE Bug 1208062", "url": "https://bugzilla.suse.com/1208062" }, { "category": "self", "summary": "SUSE Bug 1208064", "url": "https://bugzilla.suse.com/1208064" }, { "category": "self", "summary": "SUSE Bug 1208065", "url": "https://bugzilla.suse.com/1208065" }, { "category": "self", "summary": "SUSE Bug 1208270", "url": "https://bugzilla.suse.com/1208270" }, { "category": "self", "summary": "SUSE Bug 1208293", "url": "https://bugzilla.suse.com/1208293" }, { "category": "self", "summary": "SUSE Bug 1208298", "url": "https://bugzilla.suse.com/1208298" }, { "category": "self", "summary": "SUSE Bug 1208612", "url": "https://bugzilla.suse.com/1208612" }, { "category": "self", "summary": "SUSE Bug 1208692", "url": "https://bugzilla.suse.com/1208692" }, { "category": "self", "summary": "SUSE Bug 1208719", "url": "https://bugzilla.suse.com/1208719" }, { "category": "self", "summary": "SUSE Bug 1208819", "url": "https://bugzilla.suse.com/1208819" }, { "category": "self", "summary": "SUSE Bug 1208821", "url": "https://bugzilla.suse.com/1208821" }, { "category": "self", "summary": "SUSE Bug 1208965", "url": "https://bugzilla.suse.com/1208965" }, { "category": "self", "summary": "SUSE Bug 1209113", "url": "https://bugzilla.suse.com/1209113" }, { "category": "self", "summary": "SUSE Bug 1209645", "url": "https://bugzilla.suse.com/1209645" }, { "category": "self", "summary": "SUSE Bug 1210458", "url": "https://bugzilla.suse.com/1210458" }, { "category": "self", "summary": "SUSE Bug 1210907", "url": "https://bugzilla.suse.com/1210907" }, { "category": "self", "summary": "SUSE Bug 1211525", "url": "https://bugzilla.suse.com/1211525" }, { "category": "self", "summary": "SUSE Bug 1212099", "url": "https://bugzilla.suse.com/1212099" }, { "category": "self", "summary": "SUSE Bug 1212100", "url": "https://bugzilla.suse.com/1212100" }, { "category": "self", "summary": "SUSE Bug 1212279", "url": "https://bugzilla.suse.com/1212279" }, { "category": "self", "summary": "SUSE Bug 1212641", "url": "https://bugzilla.suse.com/1212641" }, { "category": "self", "summary": "SUSE Bug 1218843", "url": "https://bugzilla.suse.com/1218843" }, { "category": "self", "summary": "SUSE Bug 1218844", "url": "https://bugzilla.suse.com/1218844" }, { "category": "self", "summary": "SUSE CVE CVE-2020-7753 page", "url": "https://www.suse.com/security/cve/CVE-2020-7753/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-36222 page", "url": "https://www.suse.com/security/cve/CVE-2021-36222/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3711 page", "url": "https://www.suse.com/security/cve/CVE-2021-3711/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3807 page", "url": "https://www.suse.com/security/cve/CVE-2021-3807/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3918 page", "url": "https://www.suse.com/security/cve/CVE-2021-3918/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39226 page", "url": "https://www.suse.com/security/cve/CVE-2021-39226/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41174 page", "url": "https://www.suse.com/security/cve/CVE-2021-41174/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41244 page", "url": "https://www.suse.com/security/cve/CVE-2021-41244/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43138 page", "url": "https://www.suse.com/security/cve/CVE-2021-43138/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43798 page", "url": "https://www.suse.com/security/cve/CVE-2021-43798/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43813 page", "url": "https://www.suse.com/security/cve/CVE-2021-43813/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43815 page", "url": "https://www.suse.com/security/cve/CVE-2021-43815/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0155 page", "url": "https://www.suse.com/security/cve/CVE-2022-0155/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21673 page", "url": "https://www.suse.com/security/cve/CVE-2022-21673/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21698 page", "url": "https://www.suse.com/security/cve/CVE-2022-21698/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21702 page", "url": "https://www.suse.com/security/cve/CVE-2022-21702/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21703 page", "url": "https://www.suse.com/security/cve/CVE-2022-21703/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21713 page", "url": "https://www.suse.com/security/cve/CVE-2022-21713/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23552 page", "url": "https://www.suse.com/security/cve/CVE-2022-23552/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-27191 page", "url": "https://www.suse.com/security/cve/CVE-2022-27191/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-27664 page", "url": "https://www.suse.com/security/cve/CVE-2022-27664/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29170 page", "url": "https://www.suse.com/security/cve/CVE-2022-29170/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-31097 page", "url": "https://www.suse.com/security/cve/CVE-2022-31097/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-31107 page", "url": "https://www.suse.com/security/cve/CVE-2022-31107/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-31123 page", "url": "https://www.suse.com/security/cve/CVE-2022-31123/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-31130 page", "url": "https://www.suse.com/security/cve/CVE-2022-31130/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-32149 page", "url": "https://www.suse.com/security/cve/CVE-2022-32149/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-35957 page", "url": "https://www.suse.com/security/cve/CVE-2022-35957/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-36062 page", "url": "https://www.suse.com/security/cve/CVE-2022-36062/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-39201 page", "url": "https://www.suse.com/security/cve/CVE-2022-39201/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-39229 page", "url": "https://www.suse.com/security/cve/CVE-2022-39229/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-39306 page", "url": "https://www.suse.com/security/cve/CVE-2022-39306/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-39307 page", "url": "https://www.suse.com/security/cve/CVE-2022-39307/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-39324 page", "url": "https://www.suse.com/security/cve/CVE-2022-39324/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-41715 page", "url": "https://www.suse.com/security/cve/CVE-2022-41715/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-41723 page", "url": "https://www.suse.com/security/cve/CVE-2022-41723/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-46146 page", "url": "https://www.suse.com/security/cve/CVE-2022-46146/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0507 page", "url": "https://www.suse.com/security/cve/CVE-2023-0507/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0594 page", "url": "https://www.suse.com/security/cve/CVE-2023-0594/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1387 page", "url": "https://www.suse.com/security/cve/CVE-2023-1387/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1410 page", "url": "https://www.suse.com/security/cve/CVE-2023-1410/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2183 page", "url": "https://www.suse.com/security/cve/CVE-2023-2183/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2801 page", "url": "https://www.suse.com/security/cve/CVE-2023-2801/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3128 page", "url": "https://www.suse.com/security/cve/CVE-2023-3128/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-40577 page", "url": "https://www.suse.com/security/cve/CVE-2023-40577/" } ], "title": "Security Beta update for SUSE Manager Client Tools", "tracking": { "current_release_date": "2024-01-23T15:18:14Z", "generator": { "date": "2024-01-23T15:18:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:0191-1", "initial_release_date": "2024-01-23T15:18:14Z", "revision_history": [ { "date": "2024-01-23T15:18:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "product": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64" } }, { "category": "product_version", "name": "golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "product": { "name": "golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "product_id": "golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64" } }, { "category": "product_version", "name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "product": { "name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64" } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "product": { "name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "product_id": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64" } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "product": { "name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "product_id": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64" } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "product": { "name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "product_id": "golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64" } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "product": { "name": "golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "product_id": "golang-github-prometheus-promu-0.14.0-4.12.2.aarch64" } }, { "category": "product_version", "name": "grafana-9.5.8-4.21.2.aarch64", "product": { "name": "grafana-9.5.8-4.21.2.aarch64", "product_id": "grafana-9.5.8-4.21.2.aarch64" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "product": { "name": "prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "product_id": "prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64" } }, { "category": "product_version", "name": "prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "product": { "name": "prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "product_id": "prometheus-postgres_exporter-0.10.1-3.6.4.aarch64" } }, { "category": "product_version", "name": "python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "product": { "name": "python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "product_id": "python2-uyuni-common-libs-5.0.1-3.33.3.aarch64" } }, { "category": "product_version", "name": "uyuni-base-common-5.0.1-3.18.2.aarch64", "product": { "name": "uyuni-base-common-5.0.1-3.18.2.aarch64", "product_id": "uyuni-base-common-5.0.1-3.18.2.aarch64" } }, { "category": "product_version", "name": "uyuni-base-proxy-5.0.1-3.18.2.aarch64", "product": { "name": "uyuni-base-proxy-5.0.1-3.18.2.aarch64", "product_id": "uyuni-base-proxy-5.0.1-3.18.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "product": { "name": "kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "product_id": "kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch" } }, { "category": "product_version", "name": "mgr-push-5.0.1-4.21.4.noarch", "product": { "name": "mgr-push-5.0.1-4.21.4.noarch", "product_id": "mgr-push-5.0.1-4.21.4.noarch" } }, { "category": "product_version", "name": "python2-hwdata-2.3.5-15.12.2.noarch", "product": { "name": "python2-hwdata-2.3.5-15.12.2.noarch", "product_id": "python2-hwdata-2.3.5-15.12.2.noarch" } }, { "category": "product_version", "name": "python2-mgr-push-5.0.1-4.21.4.noarch", "product": { "name": "python2-mgr-push-5.0.1-4.21.4.noarch", "product_id": "python2-mgr-push-5.0.1-4.21.4.noarch" } }, { "category": "product_version", "name": "python2-rhnlib-5.0.1-24.30.3.noarch", "product": { "name": "python2-rhnlib-5.0.1-24.30.3.noarch", "product_id": "python2-rhnlib-5.0.1-24.30.3.noarch" } }, { "category": "product_version", "name": "spacecmd-5.0.1-41.42.3.noarch", "product": { "name": "spacecmd-5.0.1-41.42.3.noarch", "product_id": "spacecmd-5.0.1-41.42.3.noarch" } }, { "category": "product_version", "name": "supportutils-plugin-salt-1.2.2-9.9.2.noarch", "product": { "name": "supportutils-plugin-salt-1.2.2-9.9.2.noarch", "product_id": "supportutils-plugin-salt-1.2.2-9.9.2.noarch" } }, { "category": "product_version", "name": "supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "product": { "name": "supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "product_id": "supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch" } }, { "category": "product_version", "name": "system-user-grafana-1.0.0-3.7.2.noarch", "product": { "name": "system-user-grafana-1.0.0-3.7.2.noarch", "product_id": "system-user-grafana-1.0.0-3.7.2.noarch" } }, { "category": "product_version", "name": "system-user-prometheus-1.0.0-3.7.2.noarch", "product": { "name": "system-user-prometheus-1.0.0-3.7.2.noarch", "product_id": "system-user-prometheus-1.0.0-3.7.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "product": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le" } }, { "category": "product_version", "name": "golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "product": { "name": "golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "product_id": "golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le" } }, { "category": "product_version", "name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "product": { "name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le" } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "product": { "name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "product_id": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le" } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "product": { "name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "product_id": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le" } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "product": { "name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "product_id": "golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le" } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "product": { "name": "golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "product_id": "golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le" } }, { "category": "product_version", "name": "grafana-9.5.8-4.21.2.ppc64le", "product": { "name": "grafana-9.5.8-4.21.2.ppc64le", "product_id": "grafana-9.5.8-4.21.2.ppc64le" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "product": { "name": "prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "product_id": "prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le" } }, { "category": "product_version", "name": "prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "product": { "name": "prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "product_id": "prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le" } }, { "category": "product_version", "name": "python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "product": { "name": "python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "product_id": "python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le" } }, { "category": "product_version", "name": "uyuni-base-common-5.0.1-3.18.2.ppc64le", "product": { "name": "uyuni-base-common-5.0.1-3.18.2.ppc64le", "product_id": "uyuni-base-common-5.0.1-3.18.2.ppc64le" } }, { "category": "product_version", "name": "uyuni-base-proxy-5.0.1-3.18.2.ppc64le", "product": { "name": "uyuni-base-proxy-5.0.1-3.18.2.ppc64le", "product_id": "uyuni-base-proxy-5.0.1-3.18.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "product": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x" } }, { "category": "product_version", "name": "golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "product": { "name": "golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "product_id": "golang-github-boynux-squid_exporter-1.6-4.9.2.s390x" } }, { "category": "product_version", "name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "product": { "name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x" } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "product": { "name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "product_id": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x" } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "product": { "name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "product_id": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x" } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "product": { "name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "product_id": "golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x" } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "product": { "name": "golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "product_id": "golang-github-prometheus-promu-0.14.0-4.12.2.s390x" } }, { "category": "product_version", "name": "grafana-9.5.8-4.21.2.s390x", "product": { "name": "grafana-9.5.8-4.21.2.s390x", "product_id": "grafana-9.5.8-4.21.2.s390x" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "product": { "name": "prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "product_id": "prometheus-blackbox_exporter-0.24.0-3.6.3.s390x" } }, { "category": "product_version", "name": "prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "product": { "name": "prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "product_id": "prometheus-postgres_exporter-0.10.1-3.6.4.s390x" } }, { "category": "product_version", "name": "python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "product": { "name": "python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "product_id": "python2-uyuni-common-libs-5.0.1-3.33.3.s390x" } }, { "category": "product_version", "name": "uyuni-base-common-5.0.1-3.18.2.s390x", "product": { "name": "uyuni-base-common-5.0.1-3.18.2.s390x", "product_id": "uyuni-base-common-5.0.1-3.18.2.s390x" } }, { "category": "product_version", "name": "uyuni-base-proxy-5.0.1-3.18.2.s390x", "product": { "name": "uyuni-base-proxy-5.0.1-3.18.2.s390x", "product_id": "uyuni-base-proxy-5.0.1-3.18.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "product": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "product_id": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64" } }, { "category": "product_version", "name": "golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "product": { "name": "golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "product_id": "golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64" } }, { "category": "product_version", "name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "product": { "name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "product_id": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64" } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "product": { "name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "product_id": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64" } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "product": { "name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "product_id": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64" } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "product": { "name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "product_id": "golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64" } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "product": { "name": "golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "product_id": "golang-github-prometheus-promu-0.14.0-4.12.2.x86_64" } }, { "category": "product_version", "name": "grafana-9.5.8-4.21.2.x86_64", "product": { "name": "grafana-9.5.8-4.21.2.x86_64", "product_id": "grafana-9.5.8-4.21.2.x86_64" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "product": { "name": "prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "product_id": "prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64" } }, { "category": "product_version", "name": "prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "product": { "name": "prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "product_id": "prometheus-postgres_exporter-0.10.1-3.6.4.x86_64" } }, { "category": "product_version", "name": "python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "product": { "name": "python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "product_id": "python2-uyuni-common-libs-5.0.1-3.33.3.x86_64" } }, { "category": "product_version", "name": "uyuni-base-common-5.0.1-3.18.2.x86_64", "product": { "name": "uyuni-base-common-5.0.1-3.18.2.x86_64", "product_id": "uyuni-base-common-5.0.1-3.18.2.x86_64" } }, { "category": "product_version", "name": "uyuni-base-proxy-5.0.1-3.18.2.x86_64", "product": { "name": "uyuni-base-proxy-5.0.1-3.18.2.x86_64", "product_id": "uyuni-base-proxy-5.0.1-3.18.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Manager Client Tools 12-BETA", "product": { "name": "SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA" } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64" }, "product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le" }, "product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x" }, "product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64" }, "product_reference": "golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-4.9.2.s390x as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64" }, "product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le" }, "product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x" }, "product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64" }, "product_reference": "golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64" }, "product_reference": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le" }, "product_reference": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x" }, "product_reference": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64" }, "product_reference": "golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64" }, "product_reference": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le" }, "product_reference": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x" }, "product_reference": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64" }, "product_reference": "golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64" }, "product_reference": "golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le" }, "product_reference": "golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x" }, "product_reference": "golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64" }, "product_reference": "golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0.14.0-4.12.2.aarch64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64" }, "product_reference": "golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le" }, "product_reference": "golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0.14.0-4.12.2.s390x as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x" }, "product_reference": "golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0.14.0-4.12.2.x86_64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64" }, "product_reference": "golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-9.5.8-4.21.2.aarch64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64" }, "product_reference": "grafana-9.5.8-4.21.2.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-9.5.8-4.21.2.ppc64le as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le" }, "product_reference": "grafana-9.5.8-4.21.2.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-9.5.8-4.21.2.s390x as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x" }, "product_reference": "grafana-9.5.8-4.21.2.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-9.5.8-4.21.2.x86_64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64" }, "product_reference": "grafana-9.5.8-4.21.2.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch" }, "product_reference": "kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "mgr-push-5.0.1-4.21.4.noarch as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch" }, "product_reference": "mgr-push-5.0.1-4.21.4.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64" }, "product_reference": "prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le" }, "product_reference": "prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.24.0-3.6.3.s390x as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x" }, "product_reference": "prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64" }, "product_reference": "prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.1-3.6.4.aarch64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64" }, "product_reference": "prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le" }, "product_reference": "prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.1-3.6.4.s390x as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x" }, "product_reference": "prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.1-3.6.4.x86_64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64" }, "product_reference": "prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "python2-hwdata-2.3.5-15.12.2.noarch as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch" }, "product_reference": "python2-hwdata-2.3.5-15.12.2.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "python2-mgr-push-5.0.1-4.21.4.noarch as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch" }, "product_reference": "python2-mgr-push-5.0.1-4.21.4.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "python2-rhnlib-5.0.1-24.30.3.noarch as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch" }, "product_reference": "python2-rhnlib-5.0.1-24.30.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "python2-uyuni-common-libs-5.0.1-3.33.3.aarch64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64" }, "product_reference": "python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le" }, "product_reference": "python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "python2-uyuni-common-libs-5.0.1-3.33.3.s390x as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x" }, "product_reference": "python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "python2-uyuni-common-libs-5.0.1-3.33.3.x86_64 as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64" }, "product_reference": "python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "spacecmd-5.0.1-41.42.3.noarch as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch" }, "product_reference": "spacecmd-5.0.1-41.42.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "supportutils-plugin-salt-1.2.2-9.9.2.noarch as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch" }, "product_reference": "supportutils-plugin-salt-1.2.2-9.9.2.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch" }, "product_reference": "supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "system-user-grafana-1.0.0-3.7.2.noarch as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch" }, "product_reference": "system-user-grafana-1.0.0-3.7.2.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" }, { "category": "default_component_of", "full_product_name": { "name": "system-user-prometheus-1.0.0-3.7.2.noarch as component of SUSE Manager Client Tools 12-BETA", "product_id": "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" }, "product_reference": "system-user-prometheus-1.0.0-3.7.2.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12-BETA" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-7753" } ], "notes": [ { "category": "general", "text": "All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-7753", "url": "https://www.suse.com/security/cve/CVE-2020-7753" }, { "category": "external", "summary": "SUSE Bug 1218843 for CVE-2020-7753", "url": "https://bugzilla.suse.com/1218843" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "important" } ], "title": "CVE-2020-7753" }, { "cve": "CVE-2021-36222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-36222" } ], "notes": [ { "category": "general", "text": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-36222", "url": "https://www.suse.com/security/cve/CVE-2021-36222" }, { "category": "external", "summary": "SUSE Bug 1188571 for CVE-2021-36222", "url": "https://bugzilla.suse.com/1188571" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "important" } ], "title": "CVE-2021-36222" }, { "cve": "CVE-2021-3711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3711" } ], "notes": [ { "category": "general", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3711", "url": "https://www.suse.com/security/cve/CVE-2021-3711" }, { "category": "external", "summary": "SUSE Bug 1189520 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1189520" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1205663 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1205663" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "critical" } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3807", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3807" } ], "notes": [ { "category": "general", "text": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3807", "url": "https://www.suse.com/security/cve/CVE-2021-3807" }, { "category": "external", "summary": "SUSE Bug 1192154 for CVE-2021-3807", "url": "https://bugzilla.suse.com/1192154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "important" } ], "title": "CVE-2021-3807" }, { "cve": "CVE-2021-3918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3918" } ], "notes": [ { "category": "general", "text": "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3918", "url": "https://www.suse.com/security/cve/CVE-2021-3918" }, { "category": "external", "summary": "SUSE Bug 1192696 for CVE-2021-3918", "url": "https://bugzilla.suse.com/1192696" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "important" } ], "title": "CVE-2021-3918" }, { "cve": "CVE-2021-39226", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39226" } ], "notes": [ { "category": "general", "text": "Grafana is an open source data visualization platform. In affected versions unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: /dashboard/snapshot/:key, or /api/snapshots/:key. If the snapshot \"public_mode\" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: /api/snapshots-delete/:deleteKey. Regardless of the snapshot \"public_mode\" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: /api/snapshots/:key, or /api/snapshots-delete/:deleteKey. The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss. This issue has been resolved in versions 8.1.6 and 7.5.11. If for some reason you cannot upgrade you can use a reverse proxy or similar to block access to the literal paths: /api/snapshots/:key, /api/snapshots-delete/:deleteKey, /dashboard/snapshot/:key, and /api/snapshots/:key. They have no normal function and can be disabled without side effects.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39226", "url": "https://www.suse.com/security/cve/CVE-2021-39226" }, { "category": "external", "summary": "SUSE Bug 1191454 for CVE-2021-39226", "url": "https://bugzilla.suse.com/1191454" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "important" } ], "title": "CVE-2021-39226" }, { "cve": "CVE-2021-41174", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41174" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions if an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim\u0027s browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} ex: {{constructor.constructor(\u0027alert(1)\u0027)()}}. When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. Users are advised to upgrade as soon as possible. If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string {{ in the path.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41174", "url": "https://www.suse.com/security/cve/CVE-2021-41174" }, { "category": "external", "summary": "SUSE Bug 1192383 for CVE-2021-41174", "url": "https://bugzilla.suse.com/1192383" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2021-41174" }, { "cve": "CVE-2021-41244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41244" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions when the fine-grained access control beta feature is enabled and there is more than one organization in the Grafana instance admins are able to access users from other organizations. Grafana 8.0 introduced a mechanism which allowed users with the Organization Admin role to list, add, remove, and update users\u0027 roles in other organizations in which they are not an admin. With fine-grained access control enabled, organization admins can list, add, remove and update users\u0027 roles in another organization, where they do not have organization admin role. All installations between v8.0 and v8.2.3 that have fine-grained access control beta enabled and more than one organization should be upgraded as soon as possible. If you cannot upgrade, you should turn off the fine-grained access control using a feature flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41244", "url": "https://www.suse.com/security/cve/CVE-2021-41244" }, { "category": "external", "summary": "SUSE Bug 1192763 for CVE-2021-41244", "url": "https://bugzilla.suse.com/1192763" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "critical" } ], "title": "CVE-2021-41244" }, { "cve": "CVE-2021-43138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43138" } ], "notes": [ { "category": "general", "text": "In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43138", "url": "https://www.suse.com/security/cve/CVE-2021-43138" }, { "category": "external", "summary": "SUSE Bug 1200480 for CVE-2021-43138", "url": "https://bugzilla.suse.com/1200480" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "important" } ], "title": "CVE-2021-43138" }, { "cve": "CVE-2021-43798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43798" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `\u003cgrafana_host_url\u003e/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43798", "url": "https://www.suse.com/security/cve/CVE-2021-43798" }, { "category": "external", "summary": "SUSE Bug 1193492 for CVE-2021-43798", "url": "https://bugzilla.suse.com/1193492" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "important" } ], "title": "CVE-2021-43798" }, { "cve": "CVE-2021-43813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43813" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 contains a directory traversal vulnerability for fully lowercase or fully uppercase .md files. The vulnerability is limited in scope, and only allows access to files with the extension .md to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Users should upgrade to patched versions 8.3.2 or 7.5.12. For users who cannot upgrade, running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths. Alternatively, for fully lowercase or fully uppercase .md files, users can block /api/plugins/.*/markdown/.* without losing any functionality beyond inlined plugin help text.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43813", "url": "https://www.suse.com/security/cve/CVE-2021-43813" }, { "category": "external", "summary": "SUSE Bug 1193686 for CVE-2021-43813", "url": "https://bugzilla.suse.com/1193686" }, { "category": "external", "summary": "SUSE Bug 1193688 for CVE-2021-43813", "url": "https://bugzilla.suse.com/1193688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2021-43813" }, { "cve": "CVE-2021-43815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43815" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 has a directory traversal for arbitrary .csv files. It only affects instances that have the developer testing tool called TestData DB data source enabled and configured. The vulnerability is limited in scope, and only allows access to files with the extension .csv to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Versions 8.3.2 and 7.5.12 contain a patch for this issue. There is a workaround available for users who cannot upgrade. Running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43815", "url": "https://www.suse.com/security/cve/CVE-2021-43815" }, { "category": "external", "summary": "SUSE Bug 1193686 for CVE-2021-43815", "url": "https://bugzilla.suse.com/1193686" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2021-43815" }, { "cve": "CVE-2022-0155", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0155" } ], "notes": [ { "category": "general", "text": "follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0155", "url": "https://www.suse.com/security/cve/CVE-2022-0155" }, { "category": "external", "summary": "SUSE Bug 1218844 for CVE-2022-0155", "url": "https://bugzilla.suse.com/1218844" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2022-0155" }, { "cve": "CVE-2022-21673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21673" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions when a data source has the Forward OAuth Identity feature enabled, sending a query to that datasource with an API token (and no other user credentials) will forward the OAuth Identity of the most recently logged-in user. This can allow API token holders to retrieve data for which they may not have intended access. This attack relies on the Grafana instance having data sources that support the Forward OAuth Identity feature, the Grafana instance having a data source with the Forward OAuth Identity feature toggled on, the Grafana instance having OAuth enabled, and the Grafana instance having usable API keys. This issue has been patched in versions 7.5.13 and 8.3.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21673", "url": "https://www.suse.com/security/cve/CVE-2022-21673" }, { "category": "external", "summary": "SUSE Bug 1194873 for CVE-2022-21673", "url": "https://bugzilla.suse.com/1194873" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2022-21673" }, { "cve": "CVE-2022-21698", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21698" } ], "notes": [ { "category": "general", "text": "client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling around HTTP servers and clients. In client_golang prior to version 1.11.1, HTTP server is susceptible to a Denial of Service through unbounded cardinality, and potential memory exhaustion, when handling requests with non-standard HTTP methods. In order to be affected, an instrumented software must use any of `promhttp.InstrumentHandler*` middleware except `RequestsInFlight`; not filter any specific methods (e.g GET) before middleware; pass metric with `method` label name to our middleware; and not have any firewall/LB/proxy that filters away requests with unknown `method`. client_golang version 1.11.1 contains a patch for this issue. Several workarounds are available, including removing the `method` label name from counter/gauge used in the InstrumentHandler; turning off affected promhttp handlers; adding custom middleware before promhttp handler that will sanitize the request method given by Go http.Request; and using a reverse proxy or web application firewall, configured to only allow a limited set of methods.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21698", "url": "https://www.suse.com/security/cve/CVE-2022-21698" }, { "category": "external", "summary": "SUSE Bug 1196338 for CVE-2022-21698", "url": "https://bugzilla.suse.com/1196338" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "important" } ], "title": "CVE-2022-21698" }, { "cve": "CVE-2022-21702", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21702" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site Scripting (XSS) attack. The attacker could either compromise an existing datasource for a specific Grafana instance or either set up its own public service and instruct anyone to set it up in their Grafana instance. To be impacted, all of the following must be applicable. For the data source proxy: A Grafana HTTP-based datasource configured with Server as Access Mode and a URL set, the attacker has to be in control of the HTTP server serving the URL of above datasource, and a specially crafted link pointing at the attacker controlled data source must be clicked on by an authenticated user. For the plugin proxy: A Grafana HTTP-based app plugin configured and enabled with a URL set, the attacker has to be in control of the HTTP server serving the URL of above app, and a specially crafted link pointing at the attacker controlled plugin must be clocked on by an authenticated user. For the backend plugin resource: An attacker must be able to navigate an authenticated user to a compromised plugin through a crafted link. Users are advised to update to a patched version. There are no known workarounds for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21702", "url": "https://www.suse.com/security/cve/CVE-2022-21702" }, { "category": "external", "summary": "SUSE Bug 1195726 for CVE-2022-21702", "url": "https://bugzilla.suse.com/1195726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2022-21702" }, { "cve": "CVE-2022-21703", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21703" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21703", "url": "https://www.suse.com/security/cve/CVE-2022-21703" }, { "category": "external", "summary": "SUSE Bug 1195727 for CVE-2022-21703", "url": "https://bugzilla.suse.com/1195727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2022-21703" }, { "cve": "CVE-2022-21713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21713" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Affected versions of Grafana expose multiple API endpoints which do not properly handle user authorization. `/teams/:teamId` will allow an authenticated attacker to view unintended data by querying for the specific team ID, `/teams/:search` will allow an authenticated attacker to search for teams and see the total number of available teams, including for those teams that the user does not have access to, and `/teams/:teamId/members` when editors_can_admin flag is enabled, an authenticated attacker can see unintended data by querying for the specific team ID. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21713", "url": "https://www.suse.com/security/cve/CVE-2022-21713" }, { "category": "external", "summary": "SUSE Bug 1195728 for CVE-2022-21713", "url": "https://bugzilla.suse.com/1195728" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2022-21713" }, { "cve": "CVE-2022-23552", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23552" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Starting with the 8.1 branch and prior to versions 8.5.16, 9.2.10, and 9.3.4, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. The stored XSS vulnerability was possible because SVG files weren\u0027t properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. \n\nAn attacker needs to have the Editor role in order to change a panel to include either an external URL to a SVG-file containing JavaScript, or use the `data:` scheme to load an inline SVG-file containing JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. \n\nUsers may upgrade to version 8.5.16, 9.2.10, or 9.3.4 to receive a fix.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23552", "url": "https://www.suse.com/security/cve/CVE-2022-23552" }, { "category": "external", "summary": "SUSE Bug 1207749 for CVE-2022-23552", "url": "https://bugzilla.suse.com/1207749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "important" } ], "title": "CVE-2022-23552" }, { "cve": "CVE-2022-27191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-27191" } ], "notes": [ { "category": "general", "text": "The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-27191", "url": "https://www.suse.com/security/cve/CVE-2022-27191" }, { "category": "external", "summary": "SUSE Bug 1197284 for CVE-2022-27191", "url": "https://bugzilla.suse.com/1197284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "important" } ], "title": "CVE-2022-27191" }, { "cve": "CVE-2022-27664", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-27664" } ], "notes": [ { "category": "general", "text": "In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-27664", "url": "https://www.suse.com/security/cve/CVE-2022-27664" }, { "category": "external", "summary": "SUSE Bug 1203185 for CVE-2022-27664", "url": "https://bugzilla.suse.com/1203185" }, { "category": "external", "summary": "SUSE Bug 1203293 for CVE-2022-27664", "url": "https://bugzilla.suse.com/1203293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "important" } ], "title": "CVE-2022-27664" }, { "cve": "CVE-2022-29170", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29170" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn\u0027t call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29170", "url": "https://www.suse.com/security/cve/CVE-2022-29170" }, { "category": "external", "summary": "SUSE Bug 1199810 for CVE-2022-29170", "url": "https://bugzilla.suse.com/1199810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2022-29170" }, { "cve": "CVE-2022-31097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-31097" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Versions on the 8.x and 9.x branch prior to 9.0.3, 8.5.9, 8.4.10, and 8.3.10 are vulnerable to stored cross-site scripting via the Unified Alerting feature of Grafana. An attacker can exploit this vulnerability to escalate privilege from editor to admin by tricking an authenticated admin to click on a link. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch. As a workaround, it is possible to disable alerting or use legacy alerting.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-31097", "url": "https://www.suse.com/security/cve/CVE-2022-31097" }, { "category": "external", "summary": "SUSE Bug 1201535 for CVE-2022-31097", "url": "https://bugzilla.suse.com/1201535" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "important" } ], "title": "CVE-2022-31097" }, { "cve": "CVE-2022-31107", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-31107" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user\u0027s external user id is not already associated with an account in Grafana, the malicious user\u0027s email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will be able to log in to the target user\u0027s Grafana account. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch for this issue. As a workaround, concerned users can disable OAuth login to their Grafana instance, or ensure that all users authorized to log in via OAuth have a corresponding user account in Grafana linked to their email address.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-31107", "url": "https://www.suse.com/security/cve/CVE-2022-31107" }, { "category": "external", "summary": "SUSE Bug 1201539 for CVE-2022-31107", "url": "https://bugzilla.suse.com/1201539" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "important" } ], "title": "CVE-2022-31107" }, { "cve": "CVE-2022-31123", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-31123" } ], "notes": [ { "category": "general", "text": "Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-31123", "url": "https://www.suse.com/security/cve/CVE-2022-31123" }, { "category": "external", "summary": "SUSE Bug 1204302 for CVE-2022-31123", "url": "https://bugzilla.suse.com/1204302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2022-31123" }, { "cve": "CVE-2022-31130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-31130" } ], "notes": [ { "category": "general", "text": "Grafana is an open source observability and data visualization platform. Versions of Grafana for endpoints prior to 9.1.8 and 8.5.14 could leak authentication tokens to some destination plugins under some conditions. The vulnerability impacts data source and plugin proxy endpoints with authentication tokens. The destination plugin could receive a user\u0027s Grafana authentication token. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not use API keys, JWT authentication, or any HTTP Header based authentication.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-31130", "url": "https://www.suse.com/security/cve/CVE-2022-31130" }, { "category": "external", "summary": "SUSE Bug 1204305 for CVE-2022-31130", "url": "https://bugzilla.suse.com/1204305" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2022-31130" }, { "cve": "CVE-2022-32149", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-32149" } ], "notes": [ { "category": "general", "text": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-32149", "url": "https://www.suse.com/security/cve/CVE-2022-32149" }, { "category": "external", "summary": "SUSE Bug 1204501 for CVE-2022-32149", "url": "https://bugzilla.suse.com/1204501" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "important" } ], "title": "CVE-2022-32149" }, { "cve": "CVE-2022-35957", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-35957" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.1.6 and 8.5.13 are vulnerable to an escalation from admin to server admin when auth proxy is used, allowing an admin to take over the server admin account and gain full control of the grafana instance. All installations should be upgraded as soon as possible. As a workaround deactivate auth proxy following the instructions at: https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/auth-proxy/", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-35957", "url": "https://www.suse.com/security/cve/CVE-2022-35957" }, { "category": "external", "summary": "SUSE Bug 1203597 for CVE-2022-35957", "url": "https://bugzilla.suse.com/1203597" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2022-35957" }, { "cve": "CVE-2022-36062", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-36062" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In versions prior to 8.5.13, 9.0.9, and 9.1.6, Grafana is subject to Improper Preservation of Permissions resulting in privilege escalation on some folders where Admin is the only used permission. The vulnerability impacts Grafana instances where RBAC was disabled and enabled afterwards, as the migrations which are translating legacy folder permissions to RBAC permissions do not account for the scenario where the only user permission in the folder is Admin, as a result RBAC adds permissions for Editors and Viewers which allow them to edit and view folders accordingly. This issue has been patched in versions 8.5.13, 9.0.9, and 9.1.6. A workaround when the impacted folder/dashboard is known is to remove the additional permissions manually.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-36062", "url": "https://www.suse.com/security/cve/CVE-2022-36062" }, { "category": "external", "summary": "SUSE Bug 1203596 for CVE-2022-36062", "url": "https://bugzilla.suse.com/1203596" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2022-36062" }, { "cve": "CVE-2022-39201", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-39201" } ], "notes": [ { "category": "general", "text": "Grafana is an open source observability and data visualization platform. Starting with version 5.0.0-beta1 and prior to versions 8.5.14 and 9.1.8, Grafana could leak the authentication cookie of users to plugins. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. The destination plugin could receive a user\u0027s Grafana authentication cookie. Versions 9.1.8 and 8.5.14 contain a patch for this issue. There are no known workarounds.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-39201", "url": "https://www.suse.com/security/cve/CVE-2022-39201" }, { "category": "external", "summary": "SUSE Bug 1204303 for CVE-2022-39201", "url": "https://bugzilla.suse.com/1204303" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2022-39201" }, { "cve": "CVE-2022-39229", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-39229" } ], "notes": [ { "category": "general", "text": "Grafana is an open source data visualization platform for metrics, logs, and traces. Versions prior to 9.1.8 and 8.5.14 allow one user to block another user\u0027s login attempt by registering someone else\u0027e email address as a username. A Grafana user\u0027s username and email address are unique fields, that means no other user can have the same username or email address as another user. A user can have an email address as a username. However, the login system allows users to log in with either username or email address. Since Grafana allows a user to log in with either their username or email address, this creates an usual behavior where `user_1` can register with one email address and `user_2` can register their username as `user_1`\u0027s email address. This prevents `user_1` logging into the application since `user_1`\u0027s password won\u0027t match with `user_2`\u0027s email address. Versions 9.1.8 and 8.5.14 contain a patch. There are no workarounds for this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-39229", "url": "https://www.suse.com/security/cve/CVE-2022-39229" }, { "category": "external", "summary": "SUSE Bug 1204304 for CVE-2022-39229", "url": "https://bugzilla.suse.com/1204304" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "low" } ], "title": "CVE-2022-39229" }, { "cve": "CVE-2022-39306", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-39306" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.2.4, or 8.5.15 on the 8.X branch, are subject to Improper Input Validation. Grafana admins can invite other members to the organization they are an admin for. When admins add members to the organization, non existing users get an email invite, existing members are added directly to the organization. When an invite link is sent, it allows users to sign up with whatever username/email address the user chooses and become a member of the organization. This introduces a vulnerability which can be used with malicious intent. This issue is patched in version 9.2.4, and has been backported to 8.5.15. There are no known workarounds.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-39306", "url": "https://www.suse.com/security/cve/CVE-2022-39306" }, { "category": "external", "summary": "SUSE Bug 1205225 for CVE-2022-39306", "url": "https://bugzilla.suse.com/1205225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2022-39306" }, { "cve": "CVE-2022-39307", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-39307" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a \"user not found\" message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-39307", "url": "https://www.suse.com/security/cve/CVE-2022-39307" }, { "category": "external", "summary": "SUSE Bug 1205227 for CVE-2022-39307", "url": "https://bugzilla.suse.com/1205227" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2022-39307" }, { "cve": "CVE-2022-39324", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-39324" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker\u0027s injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-39324", "url": "https://www.suse.com/security/cve/CVE-2022-39324" }, { "category": "external", "summary": "SUSE Bug 1207750 for CVE-2022-39324", "url": "https://bugzilla.suse.com/1207750" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2022-39324" }, { "cve": "CVE-2022-41715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-41715" } ], "notes": [ { "category": "general", "text": "Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-41715", "url": "https://www.suse.com/security/cve/CVE-2022-41715" }, { "category": "external", "summary": "SUSE Bug 1204023 for CVE-2022-41715", "url": "https://bugzilla.suse.com/1204023" }, { "category": "external", "summary": "SUSE Bug 1208441 for CVE-2022-41715", "url": "https://bugzilla.suse.com/1208441" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41723", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-41723" } ], "notes": [ { "category": "general", "text": "A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-41723", "url": "https://www.suse.com/security/cve/CVE-2022-41723" }, { "category": "external", "summary": "SUSE Bug 1208270 for CVE-2022-41723", "url": "https://bugzilla.suse.com/1208270" }, { "category": "external", "summary": "SUSE Bug 1215588 for CVE-2022-41723", "url": "https://bugzilla.suse.com/1215588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "important" } ], "title": "CVE-2022-41723" }, { "cve": "CVE-2022-46146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-46146" } ], "notes": [ { "category": "general", "text": "Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users\u0027 bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-46146", "url": "https://www.suse.com/security/cve/CVE-2022-46146" }, { "category": "external", "summary": "SUSE Bug 1208046 for CVE-2022-46146", "url": "https://bugzilla.suse.com/1208046" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "important" } ], "title": "CVE-2022-46146" }, { "cve": "CVE-2023-0507", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0507" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. \n\nStarting with the 8.1 branch, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. \n\nThe stored XSS vulnerability was possible due to map attributions weren\u0027t properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. \n\nAn attacker needs to have the Editor role in order to change a panel to include a map attribution containing JavaScript. \n\nThis means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. \n\nUsers may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0507", "url": "https://www.suse.com/security/cve/CVE-2023-0507" }, { "category": "external", "summary": "SUSE Bug 1208821 for CVE-2023-0507", "url": "https://bugzilla.suse.com/1208821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "important" } ], "title": "CVE-2023-0507" }, { "cve": "CVE-2023-0594", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0594" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. \n\nStarting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization. \n\nThe stored XSS vulnerability was possible due the value of a span\u0027s attributes/resources were not properly sanitized and this will be rendered when the span\u0027s attributes/resources are expanded.\n\nAn attacker needs to have the Editor role in order to change the value of a trace view visualization to contain JavaScript. \n\nThis means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. \n\nUsers may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix. \n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0594", "url": "https://www.suse.com/security/cve/CVE-2023-0594" }, { "category": "external", "summary": "SUSE Bug 1208819 for CVE-2023-0594", "url": "https://bugzilla.suse.com/1208819" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "important" } ], "title": "CVE-2023-0594" }, { "cve": "CVE-2023-1387", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1387" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. \n\nStarting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. \n\nBy enabling the \"url_login\" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1387", "url": "https://www.suse.com/security/cve/CVE-2023-1387" }, { "category": "external", "summary": "SUSE Bug 1210907 for CVE-2023-1387", "url": "https://bugzilla.suse.com/1210907" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2023-1387" }, { "cve": "CVE-2023-1410", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1410" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. \n\nGrafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip. \n\nThe stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized.\n\nAn attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description. \n\n Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1410", "url": "https://www.suse.com/security/cve/CVE-2023-1410" }, { "category": "external", "summary": "SUSE Bug 1209645 for CVE-2023-1410", "url": "https://bugzilla.suse.com/1209645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2023-1410" }, { "cve": "CVE-2023-2183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2183" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. \n\nThe option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function.\n\nThis might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server.\n\nUsers may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2183", "url": "https://www.suse.com/security/cve/CVE-2023-2183" }, { "category": "external", "summary": "SUSE Bug 1212100 for CVE-2023-2183", "url": "https://bugzilla.suse.com/1212100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "moderate" } ], "title": "CVE-2023-2183" }, { "cve": "CVE-2023-2801", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2801" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. \n\nUsing public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance.\n\nThe only feature that uses mixed queries at the moment is public dashboards, but it\u0027s also possible to cause this by calling the query API directly.\n\nThis might enable malicious users to crash Grafana instances through that endpoint.\n\nUsers may upgrade to version 9.4.12 and 9.5.3 to receive a fix.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2801", "url": "https://www.suse.com/security/cve/CVE-2023-2801" }, { "category": "external", "summary": "SUSE Bug 1212099 for CVE-2023-2801", "url": "https://bugzilla.suse.com/1212099" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "important" } ], "title": "CVE-2023-2801" }, { "cve": "CVE-2023-3128", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3128" } ], "notes": [ { "category": "general", "text": "Grafana is validating Azure AD accounts based on the email claim. \n\nOn Azure AD, the profile email field is not unique and can be easily modified. \n\nThis leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3128", "url": "https://www.suse.com/security/cve/CVE-2023-3128" }, { "category": "external", "summary": "SUSE Bug 1212641 for CVE-2023-3128", "url": "https://bugzilla.suse.com/1212641" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.4, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "critical" } ], "title": "CVE-2023-3128" }, { "cve": "CVE-2023-40577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-40577" } ], "notes": [ { "category": "general", "text": "Alertmanager handles alerts sent by client applications such as the Prometheus server. An attacker with the permission to perform POST requests on the /api/v1/alerts endpoint could be able to execute arbitrary JavaScript code on the users of Prometheus Alertmanager. This issue has been fixed in Alertmanager version 0.2.51.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-40577", "url": "https://www.suse.com/security/cve/CVE-2023-40577" }, { "category": "external", "summary": "SUSE Bug 1218838 for CVE-2023-40577", "url": "https://bugzilla.suse.com/1218838" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-boynux-squid_exporter-1.6-4.9.2.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-alertmanager-0.26.0-4.12.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-node_exporter-1.5.0-4.15.4.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-prometheus-2.45.0-4.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.aarch64", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.ppc64le", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.s390x", "SUSE Manager Client Tools 12-BETA:golang-github-prometheus-promu-0.14.0-4.12.2.x86_64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.aarch64", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.ppc64le", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.s390x", "SUSE Manager Client Tools 12-BETA:grafana-9.5.8-4.21.2.x86_64", "SUSE Manager Client Tools 12-BETA:kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2.noarch", "SUSE Manager Client Tools 12-BETA:mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-blackbox_exporter-0.24.0-3.6.3.x86_64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.aarch64", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.ppc64le", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.s390x", "SUSE Manager Client Tools 12-BETA:prometheus-postgres_exporter-0.10.1-3.6.4.x86_64", "SUSE Manager Client Tools 12-BETA:python2-hwdata-2.3.5-15.12.2.noarch", "SUSE Manager Client Tools 12-BETA:python2-mgr-push-5.0.1-4.21.4.noarch", "SUSE Manager Client Tools 12-BETA:python2-rhnlib-5.0.1-24.30.3.noarch", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.aarch64", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.ppc64le", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.s390x", "SUSE Manager Client Tools 12-BETA:python2-uyuni-common-libs-5.0.1-3.33.3.x86_64", "SUSE Manager Client Tools 12-BETA:spacecmd-5.0.1-41.42.3.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-salt-1.2.2-9.9.2.noarch", "SUSE Manager Client Tools 12-BETA:supportutils-plugin-susemanager-client-5.0.1-9.15.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-grafana-1.0.0-3.7.2.noarch", "SUSE Manager Client Tools 12-BETA:system-user-prometheus-1.0.0-3.7.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-01-23T15:18:14Z", "details": "important" } ], "title": "CVE-2023-40577" } ] }
suse-su-2022:4439-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for SUSE Manager Client Tools", "title": "Title of the patch" }, { "category": "description", "text": "This update fixes the following issues:\n\ngolang-github-boynux-squid_exporter:\n\n- Exclude s390 architecture\n- Enhanced to build on Enterprise Linux 8\n\ngrafana:\n\n- Version update from 8.3.10 to 8.5.13 (jsc#PED-2145)\n- Security fixes:\n * CVE-2022-36062: (bsc#1203596)\n * CVE-2022-35957: (bsc#1203597)\n * CVE-2022-31107: (bsc#1201539)\n * CVE-2022-31097: (bsc#1201535)\n * CVE-2022-29170: (bsc#1199810)\n * CVE-2021-43813, CVE-2021-43815: (bsc#1193686)\n * CVE-2021-43798: (bsc#1193492)\n * CVE-2021-41244: (bsc#1192763)\n * CVE-2021-41174: (bsc#1192383)\n * CVE-2021-3711: (bsc#1189520)\n * CVE-2021-36222: (bsc#1188571)\n- Features and enhancements:\n * AccessControl: Disable user remove and user update roles when they do not have the permissions\n * AccessControl: Provisioning for teams\n * Alerting: Add custom grouping to Alert Panel\n * Alerting: Add safeguard for migrations that might cause dataloss\n * Alerting: AlertingProxy to elevate permissions for request forwarded to data proxy when RBAC enabled\n * Alerting: Grafana uses \u003e instead of \u003e= when checking the For duration\n * Alerting: Move slow queries in the scheduler to another goroutine\n * Alerting: Remove disabled flag for data source when migrating alerts\n * Alerting: Show notification tab of legacy alerting only to editor\n * Alerting: Update migration to migrate only alerts that belon to existing org\\dashboard\n * Alerting: Use expanded labels in dashboard annotations\n * Alerting: Use time.Ticker instead of alerting.Ticker in ngalert\n * Analytics: Add user id tracking to google analytics\n * Angular: Add AngularJS plugin support deprecation plan to docs site\n * API: Add usage stats preview endpoint\n * API: Extract OpenAPI specification from source code using go-swagger\n * Auth: implement auto_sign_up for auth.jwt\n * Azure monitor Logs: Optimize data fetching in resource picker\n * Azure Monitor Logs: Order subscriptions in resource picker by name\n * Azure Monitor: Include datasource ref when interpolating variables.\n * AzureMonitor: Add support for not equals and startsWith operators when creating Azure Metrics dimension filters.\n * AzureMonitor: Do not quote variables when a custom \u0027All\u0027 variable option is used\n * AzureMonitor: Filter list of resources by resourceType\n * AzureMonitor: Update allowed namespaces\n * BarChart: color by field, x time field, bar radius, label skipping\n * Chore: Implement OpenTelemetry in Grafana\n * Cloud Monitoring: Adds metric type to Metric drop down options\n * CloudMonitor: Correctly encode default project response\n * CloudWatch: Add all ElastiCache Redis Metrics\n * CloudWatch: Add Data Lifecycle Manager metrics and dimension\n * CloudWatch: Add Missing Elasticache Host-level metrics\n * CloudWatch: Add multi-value template variable support for log group names in logs query builder\n * CloudWatch: Add new AWS/ES metrics. #43034, @sunker\n * Cloudwatch: Add support for AWS/PrivateLink* metrics and dimensions\n * Cloudwatch: Add support for new AWS/RDS EBS* metrics\n * Cloudwatch: Add syntax highlighting and autocomplete for \u0027Metric Search\u0027\n * Cloudwatch: Add template variable query function for listing log groups\n * Configuration: Add ability to customize okta login button name and icon\n * Elasticsearch: Add deprecation notice for \u003c 7.10 versions.\n * Explore: Support custom display label for exemplar links for Prometheus datasource\n * Hotkeys: Make time range absolute/permanent\n * InfluxDB: Use backend for influxDB by default via feature toggle\n * Legend: Use correct unit for percent and count calculations\n * Logs: Escape windows newline into single newline\n * Loki: Add unpack to autocomplete suggestions\n * Loki: Use millisecond steps in Grafana 8.5.x.\n * Playlists: Enable sharing direct links to playlists\n * Plugins: Allow using both Function and Class components for app plugins\n * Plugins: Expose emotion/react to plugins to prevent load failures\n * Plugins: Introduce HTTP 207 Multi Status response to api/ds/query\n * Rendering: Add support for renderer token\n * Setting: Support configuring feature toggles with bools instead of just passing an array\n * SQLStore: Prevent concurrent migrations\n * SSE: Add Mode to drop NaN/Inf/Null in Reduction operations\n * Tempo: Switch out Select with AsyncSelect component to get loading state in Tempo Search\n * TimeSeries: Add migration for Graph panel\u0027s transform series override\n * TimeSeries: Add support for negative Y and constant transform\n * TimeSeries: Preserve null/undefined values when performing negative y transform\n * Traces: Filter by service/span name and operation in Tempo and Jaeger\n * Transformations: Add \u0027JSON\u0027 field type to ConvertFieldTypeTransformer\n * Transformations: Add an All Unique Values Reducer\n * Transformers: avoid error when the ExtractFields source field is missing\n- Breaking changes:\n * For a data source query made via /api/ds/query:\n + If the DatasourceQueryMultiStatus feature is enabled and the data source response has an error set as part of the\n DataResponse, the resulting HTTP status code is now \u0027207 Multi Status\u0027 instead of \u0027400 Bad gateway\u0027\n + If the DatasourceQueryMultiStatus feature is not enabled and the data source response has an error set as part of\n the DataResponse, the resulting HTTP status code is \u0027400 BadRequest\u0027 (no breaking change)\n * For a proxied request, e.g. Grafana\u0027s datasource or plugin proxy: \n + If the request is cancelled, e.g. from the browser/by the client, the HTTP status code is now \u0027499 Client closed\u0027\n request instead of 502 Bad gateway If the request times out, e.g. takes longer time than allowed, the HTTP status\n code is now \u0027504 Gateway timeout\u0027 instead of \u0027502 Bad gateway\u0027.\n + The change in behavior is that negative-valued series are now stacked downwards from 0 (in their own stacks),\n rather than downwards from the top of the positive stacks. We now automatically group stacks by Draw style, Line\n interpolation, and Bar alignment, making it impossible to stack bars on top of lines, or smooth lines on top of\n stepped lines\n + The meaning of the default data source has now changed from being a persisted property in a panel. Before when\n you selected the default data source for a panel and later changed the default data source to another data source\n it would change all panels who were configured to use the default data source. From now on the default data\n source is just the default for new panels and changing the default will not impact any currently saved dashboards\n + The Tooltip component provided by @grafana/ui is no longer automatically interactive (that is you can hover onto\n it and click a link or select text). It will from now on by default close automatically when you mouse out\n from the trigger element. To make tooltips behave like before set the new interactive property to true.\n- Deprecations:\n * /api/tsdb/query API has been deprecated, please use /api/ds/query instead\n * AngularJS plugin support is now in a deprecated state. The documentation site has an article with more details on why, when, and how\n- Bug fixes:\n * Alerting: Add contact points provisioning API\n * Alerting: add field for custom slack endpoint\n * Alerting: Add resolved count to notification title when both firing and resolved present\n * Alerting: Alert rule should wait For duration when execution error state is Alerting\n * Alerting: Allow disabling override timings for notification policies\n * Alerting: Allow serving images from custom url path\n * Alerting: Apply Custom Headers to datasource queries\n * Alerting: Classic conditions can now display multiple values\n * Alerting: correctly show all alerts in a folder\n * Alerting: Display query from grafana-managed alert rules on /api/v1/rules\n * Alerting: Do not overwrite existing alert rule condition\n * Alerting: Enhance support for arbitrary group names in managed alerts\n * Alerting: Fix access to alerts for viewer with editor permissions when RBAC is disabled\n * Alerting: Fix anonymous access to alerting\n * Alerting: Fix migrations by making send_alerts_to field nullable\n * Alerting: Fix RBAC actions for notification policies\n * Alerting: Fix use of \u003e instead of \u003e= when checking the For duration\n * Alerting: Remove double quotes from matchers\n * API: Include userId, orgId, uname in request logging middleware\n * Auth: Guarantee consistency of signed SigV4 headers\n * Azure Monitor : Adding json formatting of error messages in Panel Header Corner and Inspect Error Tab\n * Azure Monitor: Add 2 more Curated Dashboards for VM Insights\n * Azure Monitor: Bug Fix for incorrect variable cascading for template variables\n * Azure Monitor: Fix space character encoding for metrics query link to Azure Portal\n * Azure Monitor: Fixes broken log queries that use workspace\n * Azure Monitor: Small bug fixes for Resource Picker\n * AzureAd Oauth: Fix strictMode to reject users without an assigned role\n * AzureMonitor: Fixes metric definition for Azure Storage queue/file/blob/table resources\n * Cloudwatch : Fixed reseting metric name when changing namespace in Metric Query\n * CloudWatch: Added missing MemoryDB Namespace metrics\n * CloudWatch: Fix MetricName resetting on Namespace change.\n * Cloudwatch: Fix template variables in variable queries.\n * CloudWatch: Fix variable query tag migration\n * CloudWatch: Handle new error codes for MetricInsights\n * CloudWatch: List all metrics properly in SQL autocomplete\n * CloudWatch: Prevent log groups from being removed on query change\n * CloudWatch: Remove error message when using multi-valued template vars in region field\n * CloudWatch: Run query on blur in logs query field\n * CloudWatch: Use default http client from aws-sdk-go\n * Dashboard: Fix dashboard update permission check\n * Dashboard: Fixes random scrolling on time range change\n * Dashboard: Template variables are now correctly persisted when clicking breadcrumb links\n * DashboardExport: Fix exporting and importing dashboards where query data source ended up as incorrect\n * DashboardPage: Remember scroll position when coming back panel edit / view panel\n * Dashboards: Fixes repeating by row and no refresh\n * Dashboards: Show changes in save dialog\n * DataSource: Default data source is no longer a persisted state but just the default data source for new panels\n * DataSourcePlugin API: Allow queries import when changing data source type\n * Elasticsearch: Respect maxConcurrentShardRequests datasource setting\n * Explore: Allow users to save Explore state to a new panel in a new dashboard\n * Explore: Avoid locking timepicker when range is inverted.\n * Explore: Fix closing split pane when logs panel is used\n * Explore: Prevent direct access to explore if disabled via feature toggle\n * Explore: Remove return to panel button\n * FileUpload: clicking the Upload file button now opens their modal correctly\n * Gauge: Fixes blank viz when data link exists and orientation was horizontal\n * GrafanaUI: Fix color of links in error Tooltips in light theme\n * Histogram Panel: Take decimal into consideration\n * InfluxDB: Fixes invalid no data alerts. #48295, @yesoreyeram\n * Instrumentation: Fix HTTP request instrumentation of authentication failures\n * Instrumentation: Make backend plugin metrics endpoints available with optional authentication\n * Instrumentation: Proxy status code correction and various improvements\n * LibraryPanels: Fix library panels not connecting properly in imported dashboards\n * LibraryPanels: Prevent long descriptions and names from obscuring the delete button\n * Logger: Use specified format for file logger\n * Logging: Introduce feature toggle to activate gokit/log format\n * Logs: Handle missing fields in dataframes better\n * Loki: Improve unpack parser handling\n * ManageDashboards: Fix error when deleting all dashboards from folder view\n * Middleware: Fix IPv6 host parsing in CSRF check\n * Navigation: Prevent navbar briefly showing on login\n * NewsPanel: Add support for Atom feeds. #45390, @kaydelaney\n * OAuth: Fix parsing of ID token if header contains non-string value\n * Panel Edit: Options search now works correctly when a logarithmic scale option is set\n * Panel Edit: Visualization search now works correctly with special characters\n * Plugins Catalog: Fix styling of hyperlinks\n * Plugins: Add deprecation notice for /api/tsdb/query endpoint\n * Plugins: Adding support for traceID field to accept variables\n * Plugins: Ensure catching all appropriate 4xx api/ds/query scenarios\n * Postgres: Return tables with hyphenated schemes\n * PostgreSQL: __unixEpochGroup to support arithmetic expression as argument\n * Profile/Help: Expose option to disable profile section and help menu\n * Prometheus: Enable new visual query builder by default\n * Provisioning: Fix duplicate validation when multiple organizations have been configured inserted\n * RBAC: Fix Anonymous Editors missing dashboard controls\n * RolePicker: Fix menu position on smaller screens\n * SAML: Allow disabling of SAML signups\n * Search: Sort results correctly when using postgres\n * Security: Fixes minor code scanning security warnings in old vendored javascript libs\n * Table panel: Fix horizontal scrolling when pagination is enabled\n * Table panel: Show datalinks for cell display modes JSON View and Gauge derivates\n * Table: Fix filter crashes table\n * Table: New pagination option\n * TablePanel: Add cell inspect option\n * TablePanel: Do not prefix columns with frame name if multipleframes and override active\n * TagsInput: Fix tags remove button accessibility issues\n * Tempo / Trace Viewer: Support Span Links in Trace Viewer\n * Tempo: Download span references in data inspector\n * Tempo: Separate trace to logs and loki search datasource config\n * TextPanel: Sanitize after markdown has been rendered to html\n * TimeRange: Fixes updating time range from url and browser history\n * TimeSeries: Fix detection \u0026 rendering of sparse datapoints\n * Timeseries: Fix outside range stale state\n * TimeSeries: Properly stack series with missing datapoints\n * TimeSeries: Sort tooltip values based on raw values\n * Tooltip: Fix links not legible in Tooltips when using light theme\n * Tooltip: Sort decimals using standard numeric compare\n * Trace View: Show number of child spans\n * Transformations: Support escaped characters in key-value pair parsing\n * Transforms: Labels to fields, fix label picker layout\n * Variables: Ensure variables in query params are correctly recognised\n * Variables: Fix crash when changing query variable datasource\n * Variables: Fixes issue with data source variables not updating queries with variable\n * Visualizations: Stack negative-valued series downwards\n- Plugin development fixes:\n * Card: Increase clickable area when meta items are present.\n * ClipboardButton: Use a fallback when the Clipboard API is unavailable\n * Loki: Fix operator description propup from being shortened.\n * OAuth: Add setting to skip org assignment for external users\n * Tooltips: Make tooltips non interactive by default\n * Tracing: Add option to map tag names to log label names in trace to logs settings\n\nprometheus-blackbox_exporter:\n\n- Add requirement for go1.18 (bsc#1203599)\n\nspacecmd:\n\n- Version 4.3.16-1\n * Fix dict_keys not supporting indexing in systems_setconfigchannelorger\n * Improve Proxy FQDN hint message\n * Added a warning message for traditional stack deprecation\n * Stop always showing help for valid proxy_container_config calls\n * Remove \u0027Undefined return code\u0027 from debug messages (bsc#1203283)\n\nspacewalk-client-tools:\n\n- Version 4.3.13-1\n * Update translation strings\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-4439,SUSE-SLE-Manager-Tools-12-2022-4439", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4439-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:4439-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224439-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:4439-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013221.html" }, { "category": "self", "summary": "SUSE Bug 1188571", "url": "https://bugzilla.suse.com/1188571" }, { "category": "self", "summary": "SUSE Bug 1189520", "url": "https://bugzilla.suse.com/1189520" }, { "category": "self", "summary": "SUSE Bug 1192383", "url": "https://bugzilla.suse.com/1192383" }, { "category": "self", "summary": "SUSE Bug 1192763", "url": "https://bugzilla.suse.com/1192763" }, { "category": "self", "summary": "SUSE Bug 1193492", "url": "https://bugzilla.suse.com/1193492" }, { "category": "self", "summary": "SUSE Bug 1193686", "url": "https://bugzilla.suse.com/1193686" }, { "category": "self", "summary": "SUSE Bug 1199810", "url": "https://bugzilla.suse.com/1199810" }, { "category": "self", "summary": "SUSE Bug 1201535", "url": "https://bugzilla.suse.com/1201535" }, { "category": "self", "summary": "SUSE Bug 1201539", "url": "https://bugzilla.suse.com/1201539" }, { "category": "self", "summary": "SUSE Bug 1202945", "url": "https://bugzilla.suse.com/1202945" }, { "category": "self", "summary": "SUSE Bug 1203283", "url": "https://bugzilla.suse.com/1203283" }, { "category": "self", "summary": "SUSE Bug 1203596", "url": "https://bugzilla.suse.com/1203596" }, { "category": "self", "summary": "SUSE Bug 1203597", "url": "https://bugzilla.suse.com/1203597" }, { "category": "self", "summary": "SUSE Bug 1203599", "url": "https://bugzilla.suse.com/1203599" }, { "category": "self", "summary": "SUSE CVE CVE-2021-36222 page", "url": "https://www.suse.com/security/cve/CVE-2021-36222/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3711 page", "url": "https://www.suse.com/security/cve/CVE-2021-3711/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41174 page", "url": "https://www.suse.com/security/cve/CVE-2021-41174/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41244 page", "url": "https://www.suse.com/security/cve/CVE-2021-41244/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43798 page", "url": "https://www.suse.com/security/cve/CVE-2021-43798/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43813 page", "url": "https://www.suse.com/security/cve/CVE-2021-43813/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43815 page", "url": "https://www.suse.com/security/cve/CVE-2021-43815/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29170 page", "url": "https://www.suse.com/security/cve/CVE-2022-29170/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-31097 page", "url": "https://www.suse.com/security/cve/CVE-2022-31097/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-31107 page", "url": "https://www.suse.com/security/cve/CVE-2022-31107/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-35957 page", "url": "https://www.suse.com/security/cve/CVE-2022-35957/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-36062 page", "url": "https://www.suse.com/security/cve/CVE-2022-36062/" } ], "title": "Security update for SUSE Manager Client Tools", "tracking": { "current_release_date": "2022-12-13T07:34:23Z", "generator": { "date": "2022-12-13T07:34:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:4439-1", "initial_release_date": "2022-12-13T07:34:23Z", "revision_history": [ { "date": "2022-12-13T07:34:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "product": { "name": "golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "product_id": "golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64" } }, { "category": "product_version", "name": "grafana-8.5.13-1.36.2.aarch64", "product": { "name": "grafana-8.5.13-1.36.2.aarch64", "product_id": "grafana-8.5.13-1.36.2.aarch64" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "product": { "name": "prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "product_id": "prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64" } }, { "category": "product_version", "name": "wire-0.5.0-1.9.1.aarch64", "product": { "name": "wire-0.5.0-1.9.1.aarch64", "product_id": "wire-0.5.0-1.9.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "golang-github-boynux-squid_exporter-1.6-1.9.1.i586", "product": { "name": "golang-github-boynux-squid_exporter-1.6-1.9.1.i586", "product_id": "golang-github-boynux-squid_exporter-1.6-1.9.1.i586" } }, { "category": "product_version", "name": "grafana-8.5.13-1.36.2.i586", "product": { "name": "grafana-8.5.13-1.36.2.i586", "product_id": "grafana-8.5.13-1.36.2.i586" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.19.0-1.14.1.i586", "product": { "name": "prometheus-blackbox_exporter-0.19.0-1.14.1.i586", "product_id": "prometheus-blackbox_exporter-0.19.0-1.14.1.i586" } }, { "category": "product_version", "name": "wire-0.5.0-1.9.1.i586", "product": { "name": "wire-0.5.0-1.9.1.i586", "product_id": "wire-0.5.0-1.9.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "python2-spacewalk-check-4.3.13-52.80.1.noarch", "product": { "name": "python2-spacewalk-check-4.3.13-52.80.1.noarch", "product_id": "python2-spacewalk-check-4.3.13-52.80.1.noarch" } }, { "category": "product_version", "name": "python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "product": { "name": "python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "product_id": "python2-spacewalk-client-setup-4.3.13-52.80.1.noarch" } }, { "category": "product_version", "name": "python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "product": { "name": "python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "product_id": "python2-spacewalk-client-tools-4.3.13-52.80.1.noarch" } }, { "category": "product_version", "name": "spacecmd-4.3.16-38.112.1.noarch", "product": { "name": "spacecmd-4.3.16-38.112.1.noarch", "product_id": "spacecmd-4.3.16-38.112.1.noarch" } }, { "category": "product_version", "name": "spacewalk-check-4.3.13-52.80.1.noarch", "product": { "name": "spacewalk-check-4.3.13-52.80.1.noarch", "product_id": "spacewalk-check-4.3.13-52.80.1.noarch" } }, { "category": "product_version", "name": "spacewalk-client-setup-4.3.13-52.80.1.noarch", "product": { "name": "spacewalk-client-setup-4.3.13-52.80.1.noarch", "product_id": "spacewalk-client-setup-4.3.13-52.80.1.noarch" } }, { "category": "product_version", "name": "spacewalk-client-tools-4.3.13-52.80.1.noarch", "product": { "name": "spacewalk-client-tools-4.3.13-52.80.1.noarch", "product_id": "spacewalk-client-tools-4.3.13-52.80.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "product": { "name": "golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "product_id": "golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le" } }, { "category": "product_version", "name": "grafana-8.5.13-1.36.2.ppc64le", "product": { "name": "grafana-8.5.13-1.36.2.ppc64le", "product_id": "grafana-8.5.13-1.36.2.ppc64le" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "product": { "name": "prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "product_id": "prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le" } }, { "category": "product_version", "name": "wire-0.5.0-1.9.1.ppc64le", "product": { "name": "wire-0.5.0-1.9.1.ppc64le", "product_id": "wire-0.5.0-1.9.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "product": { "name": "golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "product_id": "golang-github-boynux-squid_exporter-1.6-1.9.1.s390x" } }, { "category": "product_version", "name": "grafana-8.5.13-1.36.2.s390x", "product": { "name": "grafana-8.5.13-1.36.2.s390x", "product_id": "grafana-8.5.13-1.36.2.s390x" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "product": { "name": "prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "product_id": "prometheus-blackbox_exporter-0.19.0-1.14.1.s390x" } }, { "category": "product_version", "name": "wire-0.5.0-1.9.1.s390x", "product": { "name": "wire-0.5.0-1.9.1.s390x", "product_id": "wire-0.5.0-1.9.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "product": { "name": "golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "product_id": "golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64" } }, { "category": "product_version", "name": "grafana-8.5.13-1.36.2.x86_64", "product": { "name": "grafana-8.5.13-1.36.2.x86_64", "product_id": "grafana-8.5.13-1.36.2.x86_64" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "product": { "name": "prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "product_id": "prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64" } }, { "category": "product_version", "name": "wire-0.5.0-1.9.1.x86_64", "product": { "name": "wire-0.5.0-1.9.1.x86_64", "product_id": "wire-0.5.0-1.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Manager Client Tools 12", "product": { "name": "SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12" } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64 as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-1.9.1.s390x as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64 as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-1.36.2.aarch64 as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64" }, "product_reference": "grafana-8.5.13-1.36.2.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-1.36.2.ppc64le as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le" }, "product_reference": "grafana-8.5.13-1.36.2.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-1.36.2.s390x as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x" }, "product_reference": "grafana-8.5.13-1.36.2.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-1.36.2.x86_64 as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64" }, "product_reference": "grafana-8.5.13-1.36.2.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64 as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-1.14.1.s390x as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64 as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-spacewalk-check-4.3.13-52.80.1.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch" }, "product_reference": "python2-spacewalk-check-4.3.13-52.80.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-spacewalk-client-setup-4.3.13-52.80.1.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch" }, "product_reference": "python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "python2-spacewalk-client-tools-4.3.13-52.80.1.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch" }, "product_reference": "python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "spacecmd-4.3.16-38.112.1.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch" }, "product_reference": "spacecmd-4.3.16-38.112.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-check-4.3.13-52.80.1.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch" }, "product_reference": "spacewalk-check-4.3.13-52.80.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-client-setup-4.3.13-52.80.1.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch" }, "product_reference": "spacewalk-client-setup-4.3.13-52.80.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-client-tools-4.3.13-52.80.1.noarch as component of SUSE Manager Client Tools 12", "product_id": "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" }, "product_reference": "spacewalk-client-tools-4.3.13-52.80.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-36222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-36222" } ], "notes": [ { "category": "general", "text": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-36222", "url": "https://www.suse.com/security/cve/CVE-2021-36222" }, { "category": "external", "summary": "SUSE Bug 1188571 for CVE-2021-36222", "url": "https://bugzilla.suse.com/1188571" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:34:23Z", "details": "important" } ], "title": "CVE-2021-36222" }, { "cve": "CVE-2021-3711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3711" } ], "notes": [ { "category": "general", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3711", "url": "https://www.suse.com/security/cve/CVE-2021-3711" }, { "category": "external", "summary": "SUSE Bug 1189520 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1189520" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1205663 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1205663" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:34:23Z", "details": "critical" } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2021-41174", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41174" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions if an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim\u0027s browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} ex: {{constructor.constructor(\u0027alert(1)\u0027)()}}. When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. Users are advised to upgrade as soon as possible. If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string {{ in the path.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41174", "url": "https://www.suse.com/security/cve/CVE-2021-41174" }, { "category": "external", "summary": "SUSE Bug 1192383 for CVE-2021-41174", "url": "https://bugzilla.suse.com/1192383" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:34:23Z", "details": "moderate" } ], "title": "CVE-2021-41174" }, { "cve": "CVE-2021-41244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41244" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions when the fine-grained access control beta feature is enabled and there is more than one organization in the Grafana instance admins are able to access users from other organizations. Grafana 8.0 introduced a mechanism which allowed users with the Organization Admin role to list, add, remove, and update users\u0027 roles in other organizations in which they are not an admin. With fine-grained access control enabled, organization admins can list, add, remove and update users\u0027 roles in another organization, where they do not have organization admin role. All installations between v8.0 and v8.2.3 that have fine-grained access control beta enabled and more than one organization should be upgraded as soon as possible. If you cannot upgrade, you should turn off the fine-grained access control using a feature flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41244", "url": "https://www.suse.com/security/cve/CVE-2021-41244" }, { "category": "external", "summary": "SUSE Bug 1192763 for CVE-2021-41244", "url": "https://bugzilla.suse.com/1192763" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:34:23Z", "details": "critical" } ], "title": "CVE-2021-41244" }, { "cve": "CVE-2021-43798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43798" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `\u003cgrafana_host_url\u003e/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43798", "url": "https://www.suse.com/security/cve/CVE-2021-43798" }, { "category": "external", "summary": "SUSE Bug 1193492 for CVE-2021-43798", "url": "https://bugzilla.suse.com/1193492" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:34:23Z", "details": "important" } ], "title": "CVE-2021-43798" }, { "cve": "CVE-2021-43813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43813" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 contains a directory traversal vulnerability for fully lowercase or fully uppercase .md files. The vulnerability is limited in scope, and only allows access to files with the extension .md to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Users should upgrade to patched versions 8.3.2 or 7.5.12. For users who cannot upgrade, running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths. Alternatively, for fully lowercase or fully uppercase .md files, users can block /api/plugins/.*/markdown/.* without losing any functionality beyond inlined plugin help text.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43813", "url": "https://www.suse.com/security/cve/CVE-2021-43813" }, { "category": "external", "summary": "SUSE Bug 1193686 for CVE-2021-43813", "url": "https://bugzilla.suse.com/1193686" }, { "category": "external", "summary": "SUSE Bug 1193688 for CVE-2021-43813", "url": "https://bugzilla.suse.com/1193688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:34:23Z", "details": "moderate" } ], "title": "CVE-2021-43813" }, { "cve": "CVE-2021-43815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43815" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 has a directory traversal for arbitrary .csv files. It only affects instances that have the developer testing tool called TestData DB data source enabled and configured. The vulnerability is limited in scope, and only allows access to files with the extension .csv to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Versions 8.3.2 and 7.5.12 contain a patch for this issue. There is a workaround available for users who cannot upgrade. Running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43815", "url": "https://www.suse.com/security/cve/CVE-2021-43815" }, { "category": "external", "summary": "SUSE Bug 1193686 for CVE-2021-43815", "url": "https://bugzilla.suse.com/1193686" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:34:23Z", "details": "moderate" } ], "title": "CVE-2021-43815" }, { "cve": "CVE-2022-29170", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29170" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn\u0027t call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29170", "url": "https://www.suse.com/security/cve/CVE-2022-29170" }, { "category": "external", "summary": "SUSE Bug 1199810 for CVE-2022-29170", "url": "https://bugzilla.suse.com/1199810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:34:23Z", "details": "moderate" } ], "title": "CVE-2022-29170" }, { "cve": "CVE-2022-31097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-31097" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Versions on the 8.x and 9.x branch prior to 9.0.3, 8.5.9, 8.4.10, and 8.3.10 are vulnerable to stored cross-site scripting via the Unified Alerting feature of Grafana. An attacker can exploit this vulnerability to escalate privilege from editor to admin by tricking an authenticated admin to click on a link. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch. As a workaround, it is possible to disable alerting or use legacy alerting.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-31097", "url": "https://www.suse.com/security/cve/CVE-2022-31097" }, { "category": "external", "summary": "SUSE Bug 1201535 for CVE-2022-31097", "url": "https://bugzilla.suse.com/1201535" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:34:23Z", "details": "important" } ], "title": "CVE-2022-31097" }, { "cve": "CVE-2022-31107", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-31107" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user\u0027s external user id is not already associated with an account in Grafana, the malicious user\u0027s email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will be able to log in to the target user\u0027s Grafana account. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch for this issue. As a workaround, concerned users can disable OAuth login to their Grafana instance, or ensure that all users authorized to log in via OAuth have a corresponding user account in Grafana linked to their email address.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-31107", "url": "https://www.suse.com/security/cve/CVE-2022-31107" }, { "category": "external", "summary": "SUSE Bug 1201539 for CVE-2022-31107", "url": "https://bugzilla.suse.com/1201539" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:34:23Z", "details": "important" } ], "title": "CVE-2022-31107" }, { "cve": "CVE-2022-35957", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-35957" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.1.6 and 8.5.13 are vulnerable to an escalation from admin to server admin when auth proxy is used, allowing an admin to take over the server admin account and gain full control of the grafana instance. All installations should be upgraded as soon as possible. As a workaround deactivate auth proxy following the instructions at: https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/auth-proxy/", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-35957", "url": "https://www.suse.com/security/cve/CVE-2022-35957" }, { "category": "external", "summary": "SUSE Bug 1203597 for CVE-2022-35957", "url": "https://bugzilla.suse.com/1203597" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:34:23Z", "details": "moderate" } ], "title": "CVE-2022-35957" }, { "cve": "CVE-2022-36062", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-36062" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In versions prior to 8.5.13, 9.0.9, and 9.1.6, Grafana is subject to Improper Preservation of Permissions resulting in privilege escalation on some folders where Admin is the only used permission. The vulnerability impacts Grafana instances where RBAC was disabled and enabled afterwards, as the migrations which are translating legacy folder permissions to RBAC permissions do not account for the scenario where the only user permission in the folder is Admin, as a result RBAC adds permissions for Editors and Viewers which allow them to edit and view folders accordingly. This issue has been patched in versions 8.5.13, 9.0.9, and 9.1.6. A workaround when the impacted folder/dashboard is known is to remove the additional permissions manually.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-36062", "url": "https://www.suse.com/security/cve/CVE-2022-36062" }, { "category": "external", "summary": "SUSE Bug 1203596 for CVE-2022-36062", "url": "https://bugzilla.suse.com/1203596" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.aarch64", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.ppc64le", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.s390x", "SUSE Manager Client Tools 12:golang-github-boynux-squid_exporter-1.6-1.9.1.x86_64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.aarch64", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.ppc64le", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.s390x", "SUSE Manager Client Tools 12:grafana-8.5.13-1.36.2.x86_64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.aarch64", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.ppc64le", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.s390x", "SUSE Manager Client Tools 12:prometheus-blackbox_exporter-0.19.0-1.14.1.x86_64", "SUSE Manager Client Tools 12:python2-spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:python2-spacewalk-client-tools-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacecmd-4.3.16-38.112.1.noarch", "SUSE Manager Client Tools 12:spacewalk-check-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-setup-4.3.13-52.80.1.noarch", "SUSE Manager Client Tools 12:spacewalk-client-tools-4.3.13-52.80.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:34:23Z", "details": "moderate" } ], "title": "CVE-2022-36062" } ] }
suse-su-2022:4437-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for SUSE Manager Client Tools", "title": "Title of the patch" }, { "category": "description", "text": "This update fixes the following issues:\n\ndracut-saltboot:\n\n- Update to version 0.1.1665997480.587fa10\n * Add dependencies on xz and gzip to support compressed images\n\ngolang-github-boynux-squid_exporter:\n\n- Exclude s390 architecture\n- Enhanced to build on Enterprise Linux 8.\n\ngrafana:\n\n- Version update from 8.3.10 to 8.5.13 (jsc#PED-2145)\n- Security fixes:\n * CVE-2022-36062: (bsc#1203596)\n * CVE-2022-35957: (bsc#1203597)\n * CVE-2022-31107: (bsc#1201539)\n * CVE-2022-31097: (bsc#1201535)\n * CVE-2022-29170: (bsc#1199810)\n * CVE-2021-43813, CVE-2021-43815: (bsc#1193686)\n * CVE-2021-43798: (bsc#1193492)\n * CVE-2021-41244: (bsc#1192763)\n * CVE-2021-41174: (bsc#1192383)\n * CVE-2021-3711: (bsc#1189520)\n * CVE-2021-36222: (bsc#1188571)\n- Features and enhancements:\n * AccessControl: Disable user remove and user update roles when they do not have the permissions\n * AccessControl: Provisioning for teams\n * Alerting: Add custom grouping to Alert Panel\n * Alerting: Add safeguard for migrations that might cause dataloss\n * Alerting: AlertingProxy to elevate permissions for request forwarded to data proxy when RBAC enabled\n * Alerting: Grafana uses \u003e instead of \u003e= when checking the For duration\n * Alerting: Move slow queries in the scheduler to another goroutine\n * Alerting: Remove disabled flag for data source when migrating alerts\n * Alerting: Show notification tab of legacy alerting only to editor\n * Alerting: Update migration to migrate only alerts that belon to existing org\\dashboard\n * Alerting: Use expanded labels in dashboard annotations\n * Alerting: Use time.Ticker instead of alerting.Ticker in ngalert\n * Analytics: Add user id tracking to google analytics\n * Angular: Add AngularJS plugin support deprecation plan to docs site\n * API: Add usage stats preview endpoint\n * API: Extract OpenAPI specification from source code using go-swagger\n * Auth: implement auto_sign_up for auth.jwt\n * Azure monitor Logs: Optimize data fetching in resource picker\n * Azure Monitor Logs: Order subscriptions in resource picker by name\n * Azure Monitor: Include datasource ref when interpolating variables.\n * AzureMonitor: Add support for not equals and startsWith operators when creating Azure Metrics dimension filters.\n * AzureMonitor: Do not quote variables when a custom \u0027All\u0027 variable option is used\n * AzureMonitor: Filter list of resources by resourceType\n * AzureMonitor: Update allowed namespaces\n * BarChart: color by field, x time field, bar radius, label skipping\n * Chore: Implement OpenTelemetry in Grafana\n * Cloud Monitoring: Adds metric type to Metric drop down options\n * CloudMonitor: Correctly encode default project response\n * CloudWatch: Add all ElastiCache Redis Metrics\n * CloudWatch: Add Data Lifecycle Manager metrics and dimension\n * CloudWatch: Add Missing Elasticache Host-level metrics\n * CloudWatch: Add multi-value template variable support for log group names in logs query builder\n * CloudWatch: Add new AWS/ES metrics. #43034, @sunker\n * Cloudwatch: Add support for AWS/PrivateLink* metrics and dimensions\n * Cloudwatch: Add support for new AWS/RDS EBS* metrics\n * Cloudwatch: Add syntax highlighting and autocomplete for \u0027Metric Search\u0027\n * Cloudwatch: Add template variable query function for listing log groups\n * Configuration: Add ability to customize okta login button name and icon\n * Elasticsearch: Add deprecation notice for \u003c 7.10 versions.\n * Explore: Support custom display label for exemplar links for Prometheus datasource\n * Hotkeys: Make time range absolute/permanent\n * InfluxDB: Use backend for influxDB by default via feature toggle\n * Legend: Use correct unit for percent and count calculations\n * Logs: Escape windows newline into single newline\n * Loki: Add unpack to autocomplete suggestions\n * Loki: Use millisecond steps in Grafana 8.5.x.\n * Playlists: Enable sharing direct links to playlists\n * Plugins: Allow using both Function and Class components for app plugins\n * Plugins: Expose emotion/react to plugins to prevent load failures\n * Plugins: Introduce HTTP 207 Multi Status response to api/ds/query\n * Rendering: Add support for renderer token\n * Setting: Support configuring feature toggles with bools instead of just passing an array\n * SQLStore: Prevent concurrent migrations\n * SSE: Add Mode to drop NaN/Inf/Null in Reduction operations\n * Tempo: Switch out Select with AsyncSelect component to get loading state in Tempo Search\n * TimeSeries: Add migration for Graph panel\u0027s transform series override\n * TimeSeries: Add support for negative Y and constant transform\n * TimeSeries: Preserve null/undefined values when performing negative y transform\n * Traces: Filter by service/span name and operation in Tempo and Jaeger\n * Transformations: Add \u0027JSON\u0027 field type to ConvertFieldTypeTransformer\n * Transformations: Add an All Unique Values Reducer\n * Transformers: avoid error when the ExtractFields source field is missing\n- Breaking changes:\n * For a data source query made via /api/ds/query:\n + If the DatasourceQueryMultiStatus feature is enabled and the data source response has an error set as part of the\n DataResponse, the resulting HTTP status code is now \u0027207 Multi Status\u0027 instead of \u0027400 Bad gateway\u0027\n + If the DatasourceQueryMultiStatus feature is not enabled and the data source response has an error set as part of\n the DataResponse, the resulting HTTP status code is \u0027400 BadRequest\u0027 (no breaking change)\n * For a proxied request, e.g. Grafana\u0027s datasource or plugin proxy: \n + If the request is cancelled, e.g. from the browser/by the client, the HTTP status code is now \u0027499 Client closed\u0027\n request instead of 502 Bad gateway If the request times out, e.g. takes longer time than allowed, the HTTP status\n code is now \u0027504 Gateway timeout\u0027 instead of \u0027502 Bad gateway\u0027.\n + The change in behavior is that negative-valued series are now stacked downwards from 0 (in their own stacks),\n rather than downwards from the top of the positive stacks. We now automatically group stacks by Draw style, Line\n interpolation, and Bar alignment, making it impossible to stack bars on top of lines, or smooth lines on top of\n stepped lines\n + The meaning of the default data source has now changed from being a persisted property in a panel. Before when\n you selected the default data source for a panel and later changed the default data source to another data source\n it would change all panels who were configured to use the default data source. From now on the default data\n source is just the default for new panels and changing the default will not impact any currently saved dashboards\n + The Tooltip component provided by @grafana/ui is no longer automatically interactive (that is you can hover onto\n it and click a link or select text). It will from now on by default close automatically when you mouse out\n from the trigger element. To make tooltips behave like before set the new interactive property to true.\n- Deprecations:\n * /api/tsdb/query API has been deprecated, please use /api/ds/query instead\n * AngularJS plugin support is now in a deprecated state. The documentation site has an article with more details on why, when, and how\n- Bug fixes:\n * Alerting: Add contact points provisioning API\n * Alerting: add field for custom slack endpoint\n * Alerting: Add resolved count to notification title when both firing and resolved present\n * Alerting: Alert rule should wait For duration when execution error state is Alerting\n * Alerting: Allow disabling override timings for notification policies\n * Alerting: Allow serving images from custom url path\n * Alerting: Apply Custom Headers to datasource queries\n * Alerting: Classic conditions can now display multiple values\n * Alerting: correctly show all alerts in a folder\n * Alerting: Display query from grafana-managed alert rules on /api/v1/rules\n * Alerting: Do not overwrite existing alert rule condition\n * Alerting: Enhance support for arbitrary group names in managed alerts\n * Alerting: Fix access to alerts for viewer with editor permissions when RBAC is disabled\n * Alerting: Fix anonymous access to alerting\n * Alerting: Fix migrations by making send_alerts_to field nullable\n * Alerting: Fix RBAC actions for notification policies\n * Alerting: Fix use of \u003e instead of \u003e= when checking the For duration\n * Alerting: Remove double quotes from matchers\n * API: Include userId, orgId, uname in request logging middleware\n * Auth: Guarantee consistency of signed SigV4 headers\n * Azure Monitor : Adding json formatting of error messages in Panel Header Corner and Inspect Error Tab\n * Azure Monitor: Add 2 more Curated Dashboards for VM Insights\n * Azure Monitor: Bug Fix for incorrect variable cascading for template variables\n * Azure Monitor: Fix space character encoding for metrics query link to Azure Portal\n * Azure Monitor: Fixes broken log queries that use workspace\n * Azure Monitor: Small bug fixes for Resource Picker\n * AzureAd Oauth: Fix strictMode to reject users without an assigned role\n * AzureMonitor: Fixes metric definition for Azure Storage queue/file/blob/table resources\n * Cloudwatch : Fixed reseting metric name when changing namespace in Metric Query\n * CloudWatch: Added missing MemoryDB Namespace metrics\n * CloudWatch: Fix MetricName resetting on Namespace change.\n * Cloudwatch: Fix template variables in variable queries.\n * CloudWatch: Fix variable query tag migration\n * CloudWatch: Handle new error codes for MetricInsights\n * CloudWatch: List all metrics properly in SQL autocomplete\n * CloudWatch: Prevent log groups from being removed on query change\n * CloudWatch: Remove error message when using multi-valued template vars in region field\n * CloudWatch: Run query on blur in logs query field\n * CloudWatch: Use default http client from aws-sdk-go\n * Dashboard: Fix dashboard update permission check\n * Dashboard: Fixes random scrolling on time range change\n * Dashboard: Template variables are now correctly persisted when clicking breadcrumb links\n * DashboardExport: Fix exporting and importing dashboards where query data source ended up as incorrect\n * DashboardPage: Remember scroll position when coming back panel edit / view panel\n * Dashboards: Fixes repeating by row and no refresh\n * Dashboards: Show changes in save dialog\n * DataSource: Default data source is no longer a persisted state but just the default data source for new panels\n * DataSourcePlugin API: Allow queries import when changing data source type\n * Elasticsearch: Respect maxConcurrentShardRequests datasource setting\n * Explore: Allow users to save Explore state to a new panel in a new dashboard\n * Explore: Avoid locking timepicker when range is inverted.\n * Explore: Fix closing split pane when logs panel is used\n * Explore: Prevent direct access to explore if disabled via feature toggle\n * Explore: Remove return to panel button\n * FileUpload: clicking the Upload file button now opens their modal correctly\n * Gauge: Fixes blank viz when data link exists and orientation was horizontal\n * GrafanaUI: Fix color of links in error Tooltips in light theme\n * Histogram Panel: Take decimal into consideration\n * InfluxDB: Fixes invalid no data alerts. #48295, @yesoreyeram\n * Instrumentation: Fix HTTP request instrumentation of authentication failures\n * Instrumentation: Make backend plugin metrics endpoints available with optional authentication\n * Instrumentation: Proxy status code correction and various improvements\n * LibraryPanels: Fix library panels not connecting properly in imported dashboards\n * LibraryPanels: Prevent long descriptions and names from obscuring the delete button\n * Logger: Use specified format for file logger\n * Logging: Introduce feature toggle to activate gokit/log format\n * Logs: Handle missing fields in dataframes better\n * Loki: Improve unpack parser handling\n * ManageDashboards: Fix error when deleting all dashboards from folder view\n * Middleware: Fix IPv6 host parsing in CSRF check\n * Navigation: Prevent navbar briefly showing on login\n * NewsPanel: Add support for Atom feeds. #45390, @kaydelaney\n * OAuth: Fix parsing of ID token if header contains non-string value\n * Panel Edit: Options search now works correctly when a logarithmic scale option is set\n * Panel Edit: Visualization search now works correctly with special characters\n * Plugins Catalog: Fix styling of hyperlinks\n * Plugins: Add deprecation notice for /api/tsdb/query endpoint\n * Plugins: Adding support for traceID field to accept variables\n * Plugins: Ensure catching all appropriate 4xx api/ds/query scenarios\n * Postgres: Return tables with hyphenated schemes\n * PostgreSQL: __unixEpochGroup to support arithmetic expression as argument\n * Profile/Help: Expose option to disable profile section and help menu\n * Prometheus: Enable new visual query builder by default\n * Provisioning: Fix duplicate validation when multiple organizations have been configured inserted\n * RBAC: Fix Anonymous Editors missing dashboard controls\n * RolePicker: Fix menu position on smaller screens\n * SAML: Allow disabling of SAML signups\n * Search: Sort results correctly when using postgres\n * Security: Fixes minor code scanning security warnings in old vendored javascript libs\n * Table panel: Fix horizontal scrolling when pagination is enabled\n * Table panel: Show datalinks for cell display modes JSON View and Gauge derivates\n * Table: Fix filter crashes table\n * Table: New pagination option\n * TablePanel: Add cell inspect option\n * TablePanel: Do not prefix columns with frame name if multipleframes and override active\n * TagsInput: Fix tags remove button accessibility issues\n * Tempo / Trace Viewer: Support Span Links in Trace Viewer\n * Tempo: Download span references in data inspector\n * Tempo: Separate trace to logs and loki search datasource config\n * TextPanel: Sanitize after markdown has been rendered to html\n * TimeRange: Fixes updating time range from url and browser history\n * TimeSeries: Fix detection \u0026 rendering of sparse datapoints\n * Timeseries: Fix outside range stale state\n * TimeSeries: Properly stack series with missing datapoints\n * TimeSeries: Sort tooltip values based on raw values\n * Tooltip: Fix links not legible in Tooltips when using light theme\n * Tooltip: Sort decimals using standard numeric compare\n * Trace View: Show number of child spans\n * Transformations: Support escaped characters in key-value pair parsing\n * Transforms: Labels to fields, fix label picker layout\n * Variables: Ensure variables in query params are correctly recognised\n * Variables: Fix crash when changing query variable datasource\n * Variables: Fixes issue with data source variables not updating queries with variable\n * Visualizations: Stack negative-valued series downwards\n- Plugin development fixes:\n * Card: Increase clickable area when meta items are present.\n * ClipboardButton: Use a fallback when the Clipboard API is unavailable\n * Loki: Fix operator description propup from being shortened.\n * OAuth: Add setting to skip org assignment for external users\n * Tooltips: Make tooltips non interactive by default\n * Tracing: Add option to map tag names to log label names in trace to logs settings\n\nprometheus-blackbox_exporter:\n\n- Add requirement for go1.18 (bsc#1203599)\n\nspacecmd:\n\n- Version 4.3.16-1\n * Fix dict_keys not supporting indexing in systems_setconfigchannelorger\n * Improve Proxy FQDN hint message\n * Added a warning message for traditional stack deprecation\n * Stop always showing help for valid proxy_container_config calls\n * Remove \u0027Undefined return code\u0027 from debug messages (bsc#1203283)\n\nspacewalk-client-tools:\n\n- Version 4.3.13-1\n * Update translation strings\n\nuyuni-proxy-systemd-services:\n\n- Version 4.3.7-1\n * Expose /etc/sysconfig/proxy variables to container services (bsc#1202945)\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-4437,SUSE-SLE-Manager-Tools-15-2022-4437,SUSE-SLE-Manager-Tools-For-Micro-5-2022-4437,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-4437,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2022-4437,openSUSE-SLE-15.3-2022-4437,openSUSE-SLE-15.4-2022-4437", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4437-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:4437-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224437-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:4437-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013220.html" }, { "category": "self", "summary": "SUSE Bug 1188571", "url": "https://bugzilla.suse.com/1188571" }, { "category": "self", "summary": "SUSE Bug 1189520", "url": "https://bugzilla.suse.com/1189520" }, { "category": "self", "summary": "SUSE Bug 1192383", "url": "https://bugzilla.suse.com/1192383" }, { "category": "self", "summary": "SUSE Bug 1192763", "url": "https://bugzilla.suse.com/1192763" }, { "category": "self", "summary": "SUSE Bug 1193492", "url": "https://bugzilla.suse.com/1193492" }, { "category": "self", "summary": "SUSE Bug 1193686", "url": "https://bugzilla.suse.com/1193686" }, { "category": "self", "summary": "SUSE Bug 1199810", "url": "https://bugzilla.suse.com/1199810" }, { "category": "self", "summary": "SUSE Bug 1201535", "url": "https://bugzilla.suse.com/1201535" }, { "category": "self", "summary": "SUSE Bug 1201539", "url": "https://bugzilla.suse.com/1201539" }, { "category": "self", "summary": "SUSE Bug 1202945", "url": "https://bugzilla.suse.com/1202945" }, { "category": "self", "summary": "SUSE Bug 1203283", "url": "https://bugzilla.suse.com/1203283" }, { "category": "self", "summary": "SUSE Bug 1203596", "url": "https://bugzilla.suse.com/1203596" }, { "category": "self", "summary": "SUSE Bug 1203597", "url": "https://bugzilla.suse.com/1203597" }, { "category": "self", "summary": "SUSE Bug 1203599", "url": "https://bugzilla.suse.com/1203599" }, { "category": "self", "summary": "SUSE CVE CVE-2021-36222 page", "url": "https://www.suse.com/security/cve/CVE-2021-36222/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3711 page", "url": "https://www.suse.com/security/cve/CVE-2021-3711/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41174 page", "url": "https://www.suse.com/security/cve/CVE-2021-41174/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41244 page", "url": "https://www.suse.com/security/cve/CVE-2021-41244/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43798 page", "url": "https://www.suse.com/security/cve/CVE-2021-43798/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43813 page", "url": "https://www.suse.com/security/cve/CVE-2021-43813/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43815 page", "url": "https://www.suse.com/security/cve/CVE-2021-43815/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29170 page", "url": "https://www.suse.com/security/cve/CVE-2022-29170/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-31097 page", "url": "https://www.suse.com/security/cve/CVE-2022-31097/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-31107 page", "url": "https://www.suse.com/security/cve/CVE-2022-31107/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-35957 page", "url": "https://www.suse.com/security/cve/CVE-2022-35957/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-36062 page", "url": "https://www.suse.com/security/cve/CVE-2022-36062/" } ], "title": "Security update for SUSE Manager Client Tools", "tracking": { "current_release_date": "2022-12-13T07:33:38Z", "generator": { "date": "2022-12-13T07:33:38Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:4437-1", "initial_release_date": "2022-12-13T07:33:38Z", "revision_history": [ { "date": "2022-12-13T07:33:38Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "product": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "product_id": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64" } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "product": { "name": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "product_id": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64" } }, { "category": "product_version", "name": "grafana-8.5.13-150000.1.36.3.aarch64", "product": { "name": "grafana-8.5.13-150000.1.36.3.aarch64", "product_id": "grafana-8.5.13-150000.1.36.3.aarch64" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "product": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "product_id": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64" } }, { "category": "product_version", "name": "wire-0.5.0-150000.1.9.3.aarch64", "product": { "name": "wire-0.5.0-150000.1.9.3.aarch64", "product_id": "wire-0.5.0-150000.1.9.3.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.i586", "product": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.i586", "product_id": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.i586" } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.i586", "product": { "name": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.i586", "product_id": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.i586" } }, { "category": "product_version", "name": "grafana-8.5.13-150000.1.36.3.i586", "product": { "name": "grafana-8.5.13-150000.1.36.3.i586", "product_id": "grafana-8.5.13-150000.1.36.3.i586" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.i586", "product": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.i586", "product_id": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.i586" } }, { "category": "product_version", "name": "wire-0.5.0-150000.1.9.3.i586", "product": { "name": "wire-0.5.0-150000.1.9.3.i586", "product_id": "wire-0.5.0-150000.1.9.3.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "product": { "name": "dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "product_id": "dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch" } }, { "category": "product_version", "name": "python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "product": { "name": "python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "product_id": "python3-spacewalk-check-4.3.13-150000.3.71.3.noarch" } }, { "category": "product_version", "name": "python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "product": { "name": "python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "product_id": "python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch" } }, { "category": "product_version", "name": "python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "product": { "name": "python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "product_id": "python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch" } }, { "category": "product_version", "name": "spacecmd-4.3.16-150000.3.89.1.noarch", "product": { "name": "spacecmd-4.3.16-150000.3.89.1.noarch", "product_id": "spacecmd-4.3.16-150000.3.89.1.noarch" } }, { "category": "product_version", "name": "spacewalk-check-4.3.13-150000.3.71.3.noarch", "product": { "name": "spacewalk-check-4.3.13-150000.3.71.3.noarch", "product_id": "spacewalk-check-4.3.13-150000.3.71.3.noarch" } }, { "category": "product_version", "name": "spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "product": { "name": "spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "product_id": "spacewalk-client-setup-4.3.13-150000.3.71.3.noarch" } }, { "category": "product_version", "name": "spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "product": { "name": "spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "product_id": "spacewalk-client-tools-4.3.13-150000.3.71.3.noarch" } }, { "category": "product_version", "name": "uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "product": { "name": "uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "product_id": "uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "product": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "product_id": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le" } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "product": { "name": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "product_id": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le" } }, { "category": "product_version", "name": "grafana-8.5.13-150000.1.36.3.ppc64le", "product": { "name": "grafana-8.5.13-150000.1.36.3.ppc64le", "product_id": "grafana-8.5.13-150000.1.36.3.ppc64le" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "product": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "product_id": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le" } }, { "category": "product_version", "name": "wire-0.5.0-150000.1.9.3.ppc64le", "product": { "name": "wire-0.5.0-150000.1.9.3.ppc64le", "product_id": "wire-0.5.0-150000.1.9.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "product": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "product_id": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x" } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "product": { "name": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "product_id": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x" } }, { "category": "product_version", "name": "grafana-8.5.13-150000.1.36.3.s390x", "product": { "name": "grafana-8.5.13-150000.1.36.3.s390x", "product_id": "grafana-8.5.13-150000.1.36.3.s390x" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "product": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "product_id": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x" } }, { "category": "product_version", "name": "wire-0.5.0-150000.1.9.3.s390x", "product": { "name": "wire-0.5.0-150000.1.9.3.s390x", "product_id": "wire-0.5.0-150000.1.9.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "product": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "product_id": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64" } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "product": { "name": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "product_id": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64" } }, { "category": "product_version", "name": "grafana-8.5.13-150000.1.36.3.x86_64", "product": { "name": "grafana-8.5.13-150000.1.36.3.x86_64", "product_id": "grafana-8.5.13-150000.1.36.3.x86_64" } }, { "category": "product_version", "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "product": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "product_id": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64" } }, { "category": "product_version", "name": "wire-0.5.0-150000.1.9.3.x86_64", "product": { "name": "wire-0.5.0-150000.1.9.3.x86_64", "product_id": "wire-0.5.0-150000.1.9.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Manager Client Tools 15", "product": { "name": "SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15" } }, { "category": "product_name", "name": "SUSE Manager Client Tools for SLE Micro 5", "product": { "name": "SUSE Manager Client Tools for SLE Micro 5", "product_id": "SUSE Manager Client Tools for SLE Micro 5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-manager-tools-micro:5" } } }, { "category": "product_name", "name": "SUSE Manager Proxy Module 4.2", "product": { "name": "SUSE Manager Proxy Module 4.2", "product_id": "SUSE Manager Proxy Module 4.2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-suse-manager-proxy:4.2" } } }, { "category": "product_name", "name": "SUSE Manager Proxy Module 4.3", "product": { "name": "SUSE Manager Proxy Module 4.3", "product_id": "SUSE Manager Proxy Module 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-suse-manager-proxy:4.3" } } }, { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch" }, "product_reference": "dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64 as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64 as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-150000.1.36.3.aarch64 as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64" }, "product_reference": "grafana-8.5.13-150000.1.36.3.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-150000.1.36.3.ppc64le as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le" }, "product_reference": "grafana-8.5.13-150000.1.36.3.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-150000.1.36.3.s390x as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x" }, "product_reference": "grafana-8.5.13-150000.1.36.3.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-150000.1.36.3.x86_64 as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64" }, "product_reference": "grafana-8.5.13-150000.1.36.3.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64 as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64 as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "python3-spacewalk-check-4.3.13-150000.3.71.3.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch" }, "product_reference": "python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch" }, "product_reference": "python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch" }, "product_reference": "python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "spacecmd-4.3.16-150000.3.89.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch" }, "product_reference": "spacecmd-4.3.16-150000.3.89.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-check-4.3.13-150000.3.71.3.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch" }, "product_reference": "spacewalk-check-4.3.13-150000.3.71.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-client-setup-4.3.13-150000.3.71.3.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch" }, "product_reference": "spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-client-tools-4.3.13-150000.3.71.3.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch" }, "product_reference": "spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch" }, "product_reference": "uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch as component of SUSE Manager Client Tools for SLE Micro 5", "product_id": "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch" }, "product_reference": "dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64 as component of SUSE Manager Client Tools for SLE Micro 5", "product_id": "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x as component of SUSE Manager Client Tools for SLE Micro 5", "product_id": "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64 as component of SUSE Manager Client Tools for SLE Micro 5", "product_id": "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5" }, { "category": "default_component_of", "full_product_name": { "name": "uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch as component of SUSE Manager Client Tools for SLE Micro 5", "product_id": "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch" }, "product_reference": "uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "relates_to_product_reference": "SUSE Manager Client Tools for SLE Micro 5" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64 as component of SUSE Manager Proxy Module 4.2", "product_id": "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Manager Proxy Module 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le as component of SUSE Manager Proxy Module 4.2", "product_id": "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Manager Proxy Module 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x as component of SUSE Manager Proxy Module 4.2", "product_id": "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "relates_to_product_reference": "SUSE Manager Proxy Module 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64 as component of SUSE Manager Proxy Module 4.2", "product_id": "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy Module 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64 as component of SUSE Manager Proxy Module 4.2", "product_id": "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "relates_to_product_reference": "SUSE Manager Proxy Module 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le as component of SUSE Manager Proxy Module 4.2", "product_id": "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "relates_to_product_reference": "SUSE Manager Proxy Module 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x as component of SUSE Manager Proxy Module 4.2", "product_id": "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "relates_to_product_reference": "SUSE Manager Proxy Module 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64 as component of SUSE Manager Proxy Module 4.2", "product_id": "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "relates_to_product_reference": "SUSE Manager Proxy Module 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64 as component of SUSE Manager Proxy Module 4.3", "product_id": "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Manager Proxy Module 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le as component of SUSE Manager Proxy Module 4.3", "product_id": "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Manager Proxy Module 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x as component of SUSE Manager Proxy Module 4.3", "product_id": "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "relates_to_product_reference": "SUSE Manager Proxy Module 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64 as component of SUSE Manager Proxy Module 4.3", "product_id": "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy Module 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64 as component of SUSE Manager Proxy Module 4.3", "product_id": "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "relates_to_product_reference": "SUSE Manager Proxy Module 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le as component of SUSE Manager Proxy Module 4.3", "product_id": "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "relates_to_product_reference": "SUSE Manager Proxy Module 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x as component of SUSE Manager Proxy Module 4.3", "product_id": "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "relates_to_product_reference": "SUSE Manager Proxy Module 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64 as component of SUSE Manager Proxy Module 4.3", "product_id": "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "relates_to_product_reference": "SUSE Manager Proxy Module 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch" }, "product_reference": "dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64" }, "product_reference": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le" }, "product_reference": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x" }, "product_reference": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64" }, "product_reference": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "spacecmd-4.3.16-150000.3.89.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch" }, "product_reference": "spacecmd-4.3.16-150000.3.89.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch" }, "product_reference": "dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64" }, "product_reference": "golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64" }, "product_reference": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le" }, "product_reference": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x" }, "product_reference": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64" }, "product_reference": "golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64" }, "product_reference": "prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "spacecmd-4.3.16-150000.3.89.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch" }, "product_reference": "spacecmd-4.3.16-150000.3.89.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "wire-0.5.0-150000.1.9.3.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64" }, "product_reference": "wire-0.5.0-150000.1.9.3.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "wire-0.5.0-150000.1.9.3.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le" }, "product_reference": "wire-0.5.0-150000.1.9.3.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "wire-0.5.0-150000.1.9.3.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x" }, "product_reference": "wire-0.5.0-150000.1.9.3.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "wire-0.5.0-150000.1.9.3.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" }, "product_reference": "wire-0.5.0-150000.1.9.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-36222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-36222" } ], "notes": [ { "category": "general", "text": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-36222", "url": "https://www.suse.com/security/cve/CVE-2021-36222" }, { "category": "external", "summary": "SUSE Bug 1188571 for CVE-2021-36222", "url": "https://bugzilla.suse.com/1188571" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:33:38Z", "details": "important" } ], "title": "CVE-2021-36222" }, { "cve": "CVE-2021-3711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3711" } ], "notes": [ { "category": "general", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3711", "url": "https://www.suse.com/security/cve/CVE-2021-3711" }, { "category": "external", "summary": "SUSE Bug 1189520 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1189520" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1205663 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1205663" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:33:38Z", "details": "critical" } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2021-41174", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41174" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions if an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim\u0027s browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} ex: {{constructor.constructor(\u0027alert(1)\u0027)()}}. When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. Users are advised to upgrade as soon as possible. If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string {{ in the path.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41174", "url": "https://www.suse.com/security/cve/CVE-2021-41174" }, { "category": "external", "summary": "SUSE Bug 1192383 for CVE-2021-41174", "url": "https://bugzilla.suse.com/1192383" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:33:38Z", "details": "moderate" } ], "title": "CVE-2021-41174" }, { "cve": "CVE-2021-41244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41244" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions when the fine-grained access control beta feature is enabled and there is more than one organization in the Grafana instance admins are able to access users from other organizations. Grafana 8.0 introduced a mechanism which allowed users with the Organization Admin role to list, add, remove, and update users\u0027 roles in other organizations in which they are not an admin. With fine-grained access control enabled, organization admins can list, add, remove and update users\u0027 roles in another organization, where they do not have organization admin role. All installations between v8.0 and v8.2.3 that have fine-grained access control beta enabled and more than one organization should be upgraded as soon as possible. If you cannot upgrade, you should turn off the fine-grained access control using a feature flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41244", "url": "https://www.suse.com/security/cve/CVE-2021-41244" }, { "category": "external", "summary": "SUSE Bug 1192763 for CVE-2021-41244", "url": "https://bugzilla.suse.com/1192763" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:33:38Z", "details": "critical" } ], "title": "CVE-2021-41244" }, { "cve": "CVE-2021-43798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43798" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `\u003cgrafana_host_url\u003e/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43798", "url": "https://www.suse.com/security/cve/CVE-2021-43798" }, { "category": "external", "summary": "SUSE Bug 1193492 for CVE-2021-43798", "url": "https://bugzilla.suse.com/1193492" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:33:38Z", "details": "important" } ], "title": "CVE-2021-43798" }, { "cve": "CVE-2021-43813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43813" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 contains a directory traversal vulnerability for fully lowercase or fully uppercase .md files. The vulnerability is limited in scope, and only allows access to files with the extension .md to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Users should upgrade to patched versions 8.3.2 or 7.5.12. For users who cannot upgrade, running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths. Alternatively, for fully lowercase or fully uppercase .md files, users can block /api/plugins/.*/markdown/.* without losing any functionality beyond inlined plugin help text.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43813", "url": "https://www.suse.com/security/cve/CVE-2021-43813" }, { "category": "external", "summary": "SUSE Bug 1193686 for CVE-2021-43813", "url": "https://bugzilla.suse.com/1193686" }, { "category": "external", "summary": "SUSE Bug 1193688 for CVE-2021-43813", "url": "https://bugzilla.suse.com/1193688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:33:38Z", "details": "moderate" } ], "title": "CVE-2021-43813" }, { "cve": "CVE-2021-43815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43815" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 has a directory traversal for arbitrary .csv files. It only affects instances that have the developer testing tool called TestData DB data source enabled and configured. The vulnerability is limited in scope, and only allows access to files with the extension .csv to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Versions 8.3.2 and 7.5.12 contain a patch for this issue. There is a workaround available for users who cannot upgrade. Running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43815", "url": "https://www.suse.com/security/cve/CVE-2021-43815" }, { "category": "external", "summary": "SUSE Bug 1193686 for CVE-2021-43815", "url": "https://bugzilla.suse.com/1193686" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:33:38Z", "details": "moderate" } ], "title": "CVE-2021-43815" }, { "cve": "CVE-2022-29170", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29170" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn\u0027t call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29170", "url": "https://www.suse.com/security/cve/CVE-2022-29170" }, { "category": "external", "summary": "SUSE Bug 1199810 for CVE-2022-29170", "url": "https://bugzilla.suse.com/1199810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:33:38Z", "details": "moderate" } ], "title": "CVE-2022-29170" }, { "cve": "CVE-2022-31097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-31097" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Versions on the 8.x and 9.x branch prior to 9.0.3, 8.5.9, 8.4.10, and 8.3.10 are vulnerable to stored cross-site scripting via the Unified Alerting feature of Grafana. An attacker can exploit this vulnerability to escalate privilege from editor to admin by tricking an authenticated admin to click on a link. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch. As a workaround, it is possible to disable alerting or use legacy alerting.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-31097", "url": "https://www.suse.com/security/cve/CVE-2022-31097" }, { "category": "external", "summary": "SUSE Bug 1201535 for CVE-2022-31097", "url": "https://bugzilla.suse.com/1201535" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:33:38Z", "details": "important" } ], "title": "CVE-2022-31097" }, { "cve": "CVE-2022-31107", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-31107" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user\u0027s external user id is not already associated with an account in Grafana, the malicious user\u0027s email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will be able to log in to the target user\u0027s Grafana account. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch for this issue. As a workaround, concerned users can disable OAuth login to their Grafana instance, or ensure that all users authorized to log in via OAuth have a corresponding user account in Grafana linked to their email address.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-31107", "url": "https://www.suse.com/security/cve/CVE-2022-31107" }, { "category": "external", "summary": "SUSE Bug 1201539 for CVE-2022-31107", "url": "https://bugzilla.suse.com/1201539" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:33:38Z", "details": "important" } ], "title": "CVE-2022-31107" }, { "cve": "CVE-2022-35957", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-35957" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.1.6 and 8.5.13 are vulnerable to an escalation from admin to server admin when auth proxy is used, allowing an admin to take over the server admin account and gain full control of the grafana instance. All installations should be upgraded as soon as possible. As a workaround deactivate auth proxy following the instructions at: https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/auth-proxy/", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-35957", "url": "https://www.suse.com/security/cve/CVE-2022-35957" }, { "category": "external", "summary": "SUSE Bug 1203597 for CVE-2022-35957", "url": "https://bugzilla.suse.com/1203597" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:33:38Z", "details": "moderate" } ], "title": "CVE-2022-35957" }, { "cve": "CVE-2022-36062", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-36062" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In versions prior to 8.5.13, 9.0.9, and 9.1.6, Grafana is subject to Improper Preservation of Permissions resulting in privilege escalation on some folders where Admin is the only used permission. The vulnerability impacts Grafana instances where RBAC was disabled and enabled afterwards, as the migrations which are translating legacy folder permissions to RBAC permissions do not account for the scenario where the only user permission in the folder is Admin, as a result RBAC adds permissions for Editors and Viewers which allow them to edit and view folders accordingly. This issue has been patched in versions 8.5.13, 9.0.9, and 9.1.6. A workaround when the impacted folder/dashboard is known is to remove the additional permissions manually.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-36062", "url": "https://www.suse.com/security/cve/CVE-2022-36062" }, { "category": "external", "summary": "SUSE Bug 1203596 for CVE-2022-36062", "url": "https://bugzilla.suse.com/1203596" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Client Tools 15:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.aarch64", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.ppc64le", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.s390x", "SUSE Manager Client Tools 15:grafana-8.5.13-150000.1.36.3.x86_64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools 15:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacecmd-4.3.16-150000.3.89.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.3.13-150000.3.71.3.noarch", "SUSE Manager Client Tools 15:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Client Tools for SLE Micro 5:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Client Tools for SLE Micro 5:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Client Tools for SLE Micro 5:uyuni-proxy-systemd-services-4.3.7-150000.1.9.3.noarch", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.2:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.2:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "SUSE Manager Proxy Module 4.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "SUSE Manager Proxy Module 4.3:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.3:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.3:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.3:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.3:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:dracut-saltboot-0.1.1665997480.587fa10-150000.1.41.1.noarch", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.aarch64", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.s390x", "openSUSE Leap 15.4:golang-github-boynux-squid_exporter-1.6-150000.1.9.1.x86_64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.aarch64", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.ppc64le", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.s390x", "openSUSE Leap 15.4:golang-github-prometheus-promu-0.13.0-150000.3.9.1.x86_64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.aarch64", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.ppc64le", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.s390x", "openSUSE Leap 15.4:prometheus-blackbox_exporter-0.19.0-150000.1.14.3.x86_64", "openSUSE Leap 15.4:spacecmd-4.3.16-150000.3.89.1.noarch", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.aarch64", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.ppc64le", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.s390x", "openSUSE Leap 15.4:wire-0.5.0-150000.1.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:33:38Z", "details": "moderate" } ], "title": "CVE-2022-36062" } ] }
suse-su-2021:2830-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssl-1_1", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssl-1_1 fixes the following security issues:\n\n- CVE-2021-3711: A bug in the implementation of the SM2 decryption code\n could lead to buffer overflows. [bsc#1189520]\n\n- CVE-2021-3712: a bug in the code for printing certificate details could\n lead to a buffer overrun that a malicious actor could exploit to crash\n the application, causing a denial-of-service attack. [bsc#1189521]\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-2830,SUSE-SLE-Module-Basesystem-15-SP2-2021-2830,SUSE-SLE-Module-Basesystem-15-SP3-2021-2830,SUSE-SUSE-MicroOS-5.0-2021-2830", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2830-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:2830-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212830-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:2830-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009341.html" }, { "category": "self", "summary": "SUSE Bug 1189520", "url": "https://bugzilla.suse.com/1189520" }, { "category": "self", "summary": "SUSE Bug 1189521", "url": "https://bugzilla.suse.com/1189521" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3711 page", "url": "https://www.suse.com/security/cve/CVE-2021-3711/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3712 page", "url": "https://www.suse.com/security/cve/CVE-2021-3712/" } ], "title": "Security update for openssl-1_1", "tracking": { "current_release_date": "2021-08-24T14:20:41Z", "generator": { "date": "2021-08-24T14:20:41Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:2830-1", "initial_release_date": "2021-08-24T14:20:41Z", "revision_history": [ { "date": "2021-08-24T14:20:41Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "product": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "product_id": "libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1d-11.27.1.aarch64", "product": { "name": "libopenssl1_1-1.1.1d-11.27.1.aarch64", "product_id": "libopenssl1_1-1.1.1d-11.27.1.aarch64" } }, { "category": "product_version", "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "product": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "product_id": "libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1d-11.27.1.aarch64", "product": { "name": "openssl-1_1-1.1.1d-11.27.1.aarch64", "product_id": "openssl-1_1-1.1.1d-11.27.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-64bit-1.1.1d-11.27.1.aarch64_ilp32", "product": { "name": "libopenssl-1_1-devel-64bit-1.1.1d-11.27.1.aarch64_ilp32", "product_id": "libopenssl-1_1-devel-64bit-1.1.1d-11.27.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libopenssl1_1-64bit-1.1.1d-11.27.1.aarch64_ilp32", "product": { "name": "libopenssl1_1-64bit-1.1.1d-11.27.1.aarch64_ilp32", "product_id": "libopenssl1_1-64bit-1.1.1d-11.27.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libopenssl1_1-hmac-64bit-1.1.1d-11.27.1.aarch64_ilp32", "product": { "name": "libopenssl1_1-hmac-64bit-1.1.1d-11.27.1.aarch64_ilp32", "product_id": "libopenssl1_1-hmac-64bit-1.1.1d-11.27.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.i586", "product": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.i586", "product_id": "libopenssl-1_1-devel-1.1.1d-11.27.1.i586" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1d-11.27.1.i586", "product": { "name": "libopenssl1_1-1.1.1d-11.27.1.i586", "product_id": "libopenssl1_1-1.1.1d-11.27.1.i586" } }, { "category": "product_version", "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.i586", "product": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.i586", "product_id": "libopenssl1_1-hmac-1.1.1d-11.27.1.i586" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1d-11.27.1.i586", "product": { "name": "openssl-1_1-1.1.1d-11.27.1.i586", "product_id": "openssl-1_1-1.1.1d-11.27.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "openssl-1_1-doc-1.1.1d-11.27.1.noarch", "product": { "name": "openssl-1_1-doc-1.1.1d-11.27.1.noarch", "product_id": "openssl-1_1-doc-1.1.1d-11.27.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "product": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "product_id": "libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1d-11.27.1.ppc64le", "product": { "name": "libopenssl1_1-1.1.1d-11.27.1.ppc64le", "product_id": "libopenssl1_1-1.1.1d-11.27.1.ppc64le" } }, { "category": "product_version", "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "product": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "product_id": "libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1d-11.27.1.ppc64le", "product": { "name": "openssl-1_1-1.1.1d-11.27.1.ppc64le", "product_id": "openssl-1_1-1.1.1d-11.27.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "product": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "product_id": "libopenssl-1_1-devel-1.1.1d-11.27.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1d-11.27.1.s390x", "product": { "name": "libopenssl1_1-1.1.1d-11.27.1.s390x", "product_id": "libopenssl1_1-1.1.1d-11.27.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "product": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "product_id": "libopenssl1_1-hmac-1.1.1d-11.27.1.s390x" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1d-11.27.1.s390x", "product": { "name": "openssl-1_1-1.1.1d-11.27.1.s390x", "product_id": "openssl-1_1-1.1.1d-11.27.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "product": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "product_id": "libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64" } }, { "category": "product_version", "name": "libopenssl-1_1-devel-32bit-1.1.1d-11.27.1.x86_64", "product": { "name": "libopenssl-1_1-devel-32bit-1.1.1d-11.27.1.x86_64", "product_id": "libopenssl-1_1-devel-32bit-1.1.1d-11.27.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1d-11.27.1.x86_64", "product": { "name": "libopenssl1_1-1.1.1d-11.27.1.x86_64", "product_id": "libopenssl1_1-1.1.1d-11.27.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "product": { "name": "libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "product_id": "libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "product": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "product_id": "libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "product": { "name": "libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "product_id": "libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1d-11.27.1.x86_64", "product": { "name": "openssl-1_1-1.1.1d-11.27.1.x86_64", "product_id": "openssl-1_1-1.1.1d-11.27.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.0", "product": { "name": "SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64" }, "product_reference": "libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le" }, "product_reference": "libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x" }, "product_reference": "libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64" }, "product_reference": "libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-11.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.aarch64" }, "product_reference": "libopenssl1_1-1.1.1d-11.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-11.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.ppc64le" }, "product_reference": "libopenssl1_1-1.1.1d-11.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-11.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.s390x" }, "product_reference": "libopenssl1_1-1.1.1d-11.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-11.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.x86_64" }, "product_reference": "libopenssl1_1-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64" }, "product_reference": "libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64" }, "product_reference": "libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le" }, "product_reference": "libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x" }, "product_reference": "libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64" }, "product_reference": "libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64" }, "product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-11.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.aarch64" }, "product_reference": "openssl-1_1-1.1.1d-11.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-11.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.ppc64le" }, "product_reference": "openssl-1_1-1.1.1d-11.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-11.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.s390x" }, "product_reference": "openssl-1_1-1.1.1d-11.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-11.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.x86_64" }, "product_reference": "openssl-1_1-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64" }, "product_reference": "libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le" }, "product_reference": "libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x" }, "product_reference": "libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64" }, "product_reference": "libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-11.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.aarch64" }, "product_reference": "libopenssl1_1-1.1.1d-11.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-11.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.ppc64le" }, "product_reference": "libopenssl1_1-1.1.1d-11.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-11.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.s390x" }, "product_reference": "libopenssl1_1-1.1.1d-11.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-11.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.x86_64" }, "product_reference": "libopenssl1_1-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64" }, "product_reference": "libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64" }, "product_reference": "libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le" }, "product_reference": "libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x" }, "product_reference": "libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64" }, "product_reference": "libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64" }, "product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-11.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.aarch64" }, "product_reference": "openssl-1_1-1.1.1d-11.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-11.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.ppc64le" }, "product_reference": "openssl-1_1-1.1.1d-11.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-11.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.s390x" }, "product_reference": "openssl-1_1-1.1.1d-11.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-11.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.x86_64" }, "product_reference": "openssl-1_1-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-11.27.1.aarch64 as component of SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.27.1.aarch64" }, "product_reference": "libopenssl1_1-1.1.1d-11.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-11.27.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.27.1.x86_64" }, "product_reference": "libopenssl1_1-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-11.27.1.aarch64 as component of SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.27.1.aarch64" }, "product_reference": "openssl-1_1-1.1.1d-11.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-11.27.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.27.1.x86_64" }, "product_reference": "openssl-1_1-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3711" } ], "notes": [ { "category": "general", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3711", "url": "https://www.suse.com/security/cve/CVE-2021-3711" }, { "category": "external", "summary": "SUSE Bug 1189520 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1189520" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1205663 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1205663" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-08-24T14:20:41Z", "details": "critical" } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3712" } ], "notes": [ { "category": "general", "text": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3712", "url": "https://www.suse.com/security/cve/CVE-2021-3712" }, { "category": "external", "summary": "SUSE Bug 1189521 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1189521" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1191640 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1191640" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1192787 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1192787" }, { "category": "external", "summary": "SUSE Bug 1194948 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1194948" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Micro 5.0:libopenssl1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Micro 5.0:openssl-1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:openssl-1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:openssl-1_1-1.1.1d-11.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-08-24T14:20:41Z", "details": "moderate" } ], "title": "CVE-2021-3712" } ] }
suse-fu-2022:1419-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Feature update for grafana", "title": "Title of the patch" }, { "category": "description", "text": "This update for grafana fixes the following issues:\n\nUpdate from version 7.5.12 to version 8.3.5 (jsc#SLE-23422)\n\n- Security:\n\n * CVE-2022-21702: XSS vulnerability in handling data sources (bsc#1195726)\n * CVE-2022-21703: cross-origin request forgery vulnerability (bsc#1195727)\n * CVE-2022-21713: Insecure Direct Object Reference vulnerability in Teams API (bsc#1195728)\n * CVE-2022-21673: GetUserInfo: return an error if no user was found (bsc#1194873)\n * CVE-2021-43813, CVE-2021-43815, CVE-2021-41244, CVE-2021-41174, CVE-2021-43798, CVE-2021-39226.\n * Upgrade Docker base image to Alpine 3.14.3.\n * CVE-2021-3711: Docker: Force use of libcrypto1.1 and libssl1.1 versions\n * Update dependencies to fix CVE-2021-36222.\n * Upgrade Go to 1.17.2.\n * Fix stylesheet injection vulnerability.\n * Fix short URL vulnerability.\n\n- License update:\n * AGPL License: Update license from Apache 2.0 to the GNU Affero General Public License (AGPL).\n\n- Breaking changes:\n * Grafana 8 Alerting enabled by default for installations that do not use legacy alerting.\n * Keep Last State for \u0027If execution error or timeout\u0027 when upgrading to Grafana 8 alerting.\n * Fix No Data behaviour in Legacy Alerting.\n * The following endpoints were deprecated for Grafana v5.0 and\n support for them has now been removed:\n * `GET /dashboards/db/:slug`\n * `GET /dashboard-solo/db/:slug`\n * `GET /api/dashboard/db/:slug`\n * `DELETE /api/dashboards/db/:slug`\n * The default HTTP method for Prometheus data source is now POST.\n * Removes the never refresh option for Query variables.\n * Removes the experimental Tags feature for Variables.\n\n- Deprecations:\n * The InfoBox \u0026 FeatureInfoBox are now deprecated please use\n the Alert component instead with severity info.\n\n- Bug fixes:\n * Azure Monitor: Bug fix for variable interpolations in metrics dropdowns.\n * Azure Monitor: Improved error messages for variable queries.\n * CloudMonitoring: Fixes broken variable queries that use group bys.\n * Configuration: You can now see your expired API keys if you have no active ones.\n * Elasticsearch: Fix handling multiple datalinks for a single field.\n * Export: Fix error when exporting dashboards using query variables that reference the default datasource.\n * ImportDashboard: Fixes issue with importing dashboard and name ending up in uid.\n * Login: Page no longer overflows on mobile.\n * Plugins: Set backend metadata property for core plugins.\n * Prometheus: Fill missing steps with null values.\n * Prometheus: Fix interpolation of `$__rate_interval` variable.\n * Prometheus: Interpolate variables with curly brackets syntax.\n * Prometheus: Respect the http-method data source setting.\n * Table: Fixes issue with field config applied to wrong fields when hiding columns.\n * Toolkit: Fix bug with rootUrls not being properly parsed when signing a private plugin.\n * Variables: Fix so data source variables are added to adhoc configuration.\n * AnnoListPanel: Fix interpolation of variables in tags.\n * CloudWatch: Allow queries to have no dimensions specified.\n * CloudWatch: Fix broken queries for users migrating from 8.2.4/8.2.5 to 8.3.0.\n * CloudWatch: Make sure MatchExact flag gets the right value.\n * Dashboards: Fix so that empty folders can be deleted from the manage dashboards/folders page.\n * InfluxDB: Improve handling of metadata query errors in InfluxQL.\n * Loki: Fix adding of ad hoc filters for queries with parser and line_format expressions.\n * Prometheus: Fix running of exemplar queries for non-histogram metrics.\n * Prometheus: Interpolate template variables in interval.\n * StateTimeline: Fix toolitp not showing when for frames with multiple fields.\n * TraceView: Fix virtualized scrolling when trace view is opened in right pane in Explore.\n * Variables: Fix repeating panels for on time range changed variables.\n * Variables: Fix so queryparam option works for scoped variables.\n * Alerting: Clear alerting rule evaluation errors after intermittent failures.\n * Alerting: Fix refresh on legacy Alert List panel.\n * Dashboard: Fix queries for panels with non-integer widths.\n * Explore: Fix url update inconsistency.\n * Prometheus: Fix range variables interpolation for time ranges smaller than 1 second.\n * ValueMappings: Fixes issue with regex value mapping that only sets color.\n * AccessControl: Renamed orgs roles, removed fixed:orgs:reader introduced in beta1.\n * Azure Monitor: Add trap focus for modals in grafana/ui and other small a11y fixes for Azure Monitor.\n * CodeEditor: Prevent suggestions from being clipped.\n * Dashboard: Fix cache timeout persistence.\n * Datasource: Fix stable sort order of query responses.\n * Explore: Fix error in query history when removing last item.\n * Logs: Fix requesting of older logs when flipped order.\n * Prometheus: Fix running of health check query based on access mode.\n * TextPanel: Fix suggestions for existing panels.\n * Tracing: Fix incorrect indentations due to reoccurring spanIDs.\n * Tracing: Show start time of trace with milliseconds precision.\n * Variables: Make renamed or missing variable section expandable.\n * API: Fix dashboard quota limit for imports.\n * Alerting: Fix rule editor issues with Azure Monitor data source.\n * Azure monitor: Make sure alert rule editor is not enabled when template variables are being used.\n * CloudMonitoring: Fix annotation queries.\n * CodeEditor: Trigger the latest getSuggestions() passed to CodeEditor.\n * Dashboard: Remove the current panel from the list of options in the Dashboard datasource.\n * Encryption: Fix decrypting secrets in alerting migration.\n * InfluxDB: Fix corner case where index is too large in ALIAS field.\n * NavBar: Order App plugins alphabetically.\n * NodeGraph: Fix zooming sensitivity on touchpads.\n * Plugins: Add OAuth pass-through logic to api/ds/query endpoint.\n * Snapshots: Fix panel inspector for snapshot data.\n * Tempo: Fix basic auth password reset on adding tag.\n * ValueMapping: Fixes issue with regex mappings.\n * TimeSeries: Fix fillBelowTo wrongly affecting fills of unrelated series.\n * Alerting: Fix a bug where the metric in the evaluation string was not correctly populated.\n * Alerting: Fix no data behaviour in Legacy Alerting for alert rules using the AND operator.\n * CloudMonitoring: Ignore min and max aggregation in MQL queries.\n * Dashboards: \u0027Copy\u0027 is no longer added to new dashboard titles.\n * DataProxy: Fix overriding response body when response is a WebSocket upgrade.\n * Elasticsearch: Use field configured in query editor as field for date_histogram aggregations.\n * Explore: Fix running queries without a datasource property set.\n * InfluxDB: Fix numeric aliases in queries.\n * Plugins: Ensure consistent plugin settings list response.\n * Tempo: Fix validation of float durations.\n * Tracing: Correct tags for each span are shown.\n * Alerting: Fix panic when Slack\u0027s API sends unexpected response.\n * Alerting: The Create Alert button now appears on the dashboard panel when you are working with a default \n datasource.\n * Explore: We fixed the problem where the Explore log panel disappears when an Elasticsearch logs query returns no \n results.\n * Graph: You can now see annotation descriptions on hover.\n * Logs: The system now uses the JSON parser only if the line is parsed to an object.\n * Prometheus: the system did not reuse TCP connections when querying from Grafana alerting.\n * Prometheus: error when a user created a query with a `$__interval` min step.\n * RowsToFields: the system was not properly interpreting number values.\n * Scale: We fixed how the system handles NaN percent when data min = data max.\n * Table panel: You can now create a filter that includes special characters.\n * Dashboard: Fix rendering of repeating panels.\n * Datasources: Fix deletion of data source if plugin is not found.\n * Packaging: Remove systemcallfilters sections from systemd unit files.\n * Prometheus: Add Headers to HTTP client options.\n * CodeEditor: Ensure that we trigger the latest onSave callback provided to the component.\n * DashboardList/AlertList: Fix for missing All folder value.\n * Alerting: Fixed an issue where the edit page crashes if you tried to preview an alert without a condition set.\n * Alerting: Fixed rules migration to keep existing Grafana 8 alert rules.\n * Alerting: Fixed the silence file content generated during migration.\n * Analytics: Fixed an issue related to interaction event propagation in Azure Application Insights.\n * BarGauge: Fixed an issue where the cell color was lit even though there was no data.\n * BarGauge: Improved handling of streaming data.\n * CloudMonitoring: Fixed INT64 label unmarshal error.\n * ConfirmModal: Fixes confirm button focus on modal open.\n * Dashboard: Add option to generate short URL for variables with values containing spaces.\n * Explore: No longer hides errors containing refId property.\n * Fixed an issue that produced State timeline panel tooltip error when data was not in sync.\n * InfluxDB: InfluxQL query editor is set to always use resultFormat.\n * Loki: Fixed creating context query for logs with parsed labels.\n * PageToolbar: Fixed alignment of titles.\n * Plugins Catalog: Update to the list of available panels after an install, update or uninstall.\n * TimeSeries: Fixed an issue where the shared cursor was not showing when hovering over in old Graph panel.\n * Variables: Fixed issues related to change of focus or refresh pages when pressing enter in a text box variable \n input.\n * Variables: Panel no longer crash when using the adhoc variable in data links.\n * Admin: Prevent user from deleting user\u0027s current/active organization.\n * LibraryPanels: Fix library panel getting saved in the dashboard\u0027s folder.\n * OAuth: Make generic teams URL and JMES path configurable.\n * QueryEditor: Fix broken copy-paste for mouse middle-click\n * Thresholds: Fix undefined color in \u0027Add threshold\u0027.\n * Timeseries: Add wide-to-long, and fix multi-frame output.\n * TooltipPlugin: Fix behavior of Shared Crosshair when Tooltip is set to All.\n * Alerting: Fix alerts with evaluation interval more than 30\n seconds resolving before notification.\n * Elasticsearch/Prometheus: Fix usage of proper SigV4 service\n namespace.\n * BarChart: Fixes panel error that happens on second refresh.\n * Alerting: Fix notification channel migration.\n * Annotations: Fix blank panels for queries with unknown data\n sources.\n * BarChart: Fix stale values and x axis labels.\n * Graph: Make old graph panel thresholds work even if ngalert\n is enabled.\n * InfluxDB: Fix regex to identify / as separator.\n * LibraryPanels: Fix update issues related to library panels in\n rows.\n * Variables: Fix variables not updating inside a Panel when the\n preceding Row uses \u0027Repeat For\u0027.\n * Alerting: Fix alert flapping in the internal alertmanager.\n * Alerting: Fix request handler failed to convert dataframe\n \u0027results\u0027 to plugins.DataTimeSeriesSlice: input frame is not\n recognized as a time series.\n * Dashboard: Fix UIDs are not preserved when importing/creating\n dashboards thru importing .json file.\n * Dashboard: Forces panel re-render when exiting panel edit.\n * Dashboard: Prevent folder from changing when navigating to\n general settings.\n * Elasticsearch: Fix metric names for alert queries.\n * Elasticsearch: Limit Histogram field parameter to numeric values.\n * Elasticsearch: Prevent pipeline aggregations to show up in\n terms order by options.\n * LibraryPanels: Prevent duplicate repeated panels from being created.\n * Loki: Fix ad-hoc filter in dashboard when used with parser.\n * Plugins: Track signed files + add warn log for plugin assets\n which are not signed.\n * Postgres/MySQL/MSSQL: Fix region annotations not displayed correctly.\n * Prometheus: Fix validate selector in metrics browser.\n * Alerting: Fix saving LINE contact point.\n * Annotations: Fix alerting annotation coloring.\n * Annotations: Alert annotations are now visible in the correct\n Panel.\n * Auth: Hide SigV4 config UI and disable middleware when its\n config flag is disabled.\n * Dashboard: Prevent incorrect panel layout by comparing window\n width against theme breakpoints.\n * Elasticsearch: Fix metric names for alert queries.\n * Explore: Fix showing of full log context.\n * PanelEdit: Fix \u0027Actual\u0027 size by passing the correct panel\n size to Dashboard.\n * Plugins: Fix TLS datasource settings.\n * Variables: Fix issue with empty drop downs on navigation.\n * Variables: Fix URL util converting false into true.\n * CloudWatch Logs: Fix crash when no region is selected.\n * Annotations: Correct annotations that are displayed upon page refresh.\n * Annotations: Fix Enabled button that disappeared from Grafana v8.0.6.\n * Annotations: Fix data source template variable that was not available for annotations.\n * AzureMonitor: Fix annotations query editor that does not load.\n * Geomap: Fix scale calculations.\n * GraphNG: Fix y-axis autosizing.\n * Live: Display stream rate and fix duplicate channels in list response.\n * Loki: Update labels in log browser when time range changes in dashboard.\n * NGAlert: Send resolve signal to alertmanager on alerting -\u003e Normal.\n * PasswordField: Prevent a password from being displayed when you click the Enter button.\n * Renderer: Remove debug.log file when Grafana is stopped.\n * Docker: Fix builds by delaying go mod verify until all required files are copied over.\n * Exemplars: Fix disable exemplars only on the query that failed.\n * SQL: Fix SQL dataframe resampling (fill mode + time intervals).\n * Alerting: Handle marshaling Inf values.\n * AzureMonitor: Fix macro resolution for template variables.\n * AzureMonitor: Fix queries with Microsoft.NetApp/../../volumes\n resources.\n * AzureMonitor: Request and concat subsequent resource pages.\n * Bug: Fix parse duration for day.\n * Datasources: Improve error handling for error messages.\n * Explore: Correct the functionality of shift-enter shortcut\n across all uses.\n * Explore: Show all dataFrames in data tab in Inspector.\n * GraphNG: Fix Tooltip mode \u0027All\u0027 for XYChart.\n * Loki: Fix highlight of logs when using filter expressions\n with backticks.\n * Modal: Force modal content to overflow with scroll.\n * Plugins: Ignore symlinked folders when verifying plugin\n signature.\n * Alerting: Fix improper alert by changing the handling of\n empty labels.\n * CloudWatch/Logs: Reestablish Cloud Watch alert behavior.\n * Dashboard: Avoid migration breaking on fieldConfig without\n defaults field in folded panel.\n * DashboardList: Fix issue not re-fetching dashboard list after\n variable change.\n * Database: Fix incorrect format of isolation level\n configuration parameter for MySQL.\n * InfluxDB: Correct tag filtering on InfluxDB data.\n * Links: Fix links that caused a full page reload.\n * Live: Fix HTTP error when InfluxDB metrics have an incomplete\n or asymmetrical field set.\n * Postgres/MySQL/MSSQL: Change time field to \u0027Time\u0027 for time\n series queries.\n * Postgres: Fix the handling of a null return value in query\n results.\n * Tempo: Show hex strings instead of uints for IDs.\n * TimeSeries: Improve tooltip positioning when tooltip\n overflows.\n * Transformations: Add \u0027prepare time series\u0027 transformer.\n * AzureMonitor: Fix issue where resource group name is missing\n on the resource picker button.\n * Chore: Fix AWS auth assuming role with workspace IAM.\n * DashboardQueryRunner: Fixes unrestrained subscriptions being\n created.\n * DateFormats: Fix reading correct setting key for\n use_browser_locale.\n * Links: Fix links to other apps outside Grafana when under sub\n path.\n * Snapshots: Fix snapshot absolute time range issue.\n * Table: Fix data link color.\n * Time Series: Fix X-axis time format when tick increment is\n larger than a year.\n * Tooltip Plugin: Prevent tooltip render if field is undefined.\n * Elasticsearch: Allow case sensitive custom options in\n date_histogram interval.\n * Elasticsearch: Restore previous field naming strategy when\n using variables.\n * Explore: Fix import of queries between SQL data sources.\n * InfluxDB: InfluxQL query editor: fix retention policy\n handling.\n * Loki: Send correct time range in template variable queries.\n * TimeSeries: Preserve RegExp series overrides when migrating\n from old graph panel.\n * Annotations: Fix annotation line and marker colors.\n * AzureMonitor: Fix KQL template variable queries without\n default workspace.\n * CloudWatch/Logs: Fix missing response data for log queries.\n * Elasticsearch: Restore previous field naming strategy when\n using variables.\n * LibraryPanels: Fix crash in library panels list when panel\n plugin is not found.\n * LogsPanel: Fix performance drop when moving logs panel in\n dashboard.\n * Loki: Parse log levels when ANSI coloring is enabled.\n * MSSQL: Fix issue with hidden queries still being executed.\n * PanelEdit: Display the VisualizationPicker that was not\n displayed if a panel has an unknown panel plugin.\n * Plugins: Fix loading symbolically linked plugins.\n * Prometheus: Fix issue where legend name was replaced with\n name Value in stat and gauge panels.\n * State Timeline: Fix crash when hovering over panel.\n * Configuration: Fix changing org preferences in FireFox.\n * PieChart: Fix legend dimension limits.\n * Postgres/MySQL/MSSQL: Fix panic in concurrent map writes.\n * Variables: Hide default data source if missing from regex.\n * Alerting/SSE: Fix \u0027count_non_null\u0027 reducer validation.\n * Cloudwatch: Fix duplicated time series.\n * Cloudwatch: Fix missing defaultRegion.\n * Dashboard: Fix Dashboard init failed error on dashboards with\n old singlestat panels in collapsed rows.\n * Datasource: Fix storing timeout option as numeric.\n * Postgres/MySQL/MSSQL: Fix annotation parsing for empty\n responses.\n * Postgres/MySQL/MSSQL: Numeric/non-string values are now\n returned from query variables.\n * Postgres: Fix an error that was thrown when the annotation\n query did not return any results.\n * StatPanel: Fix an issue with the appearance of the graph when\n switching color mode.\n * Visualizations: Fix an issue in the\n Stat/BarGauge/Gauge/PieChart panels where all values mode\n were showing the same name if they had the same value.\n * AzureMonitor: Fix Azure Resource Graph queries in Azure\n China.\n * Checkbox: Fix vertical layout issue with checkboxes due to\n fixed height.\n * Dashboard: Fix Table view when editing causes the panel data\n to not update.\n * Dashboard: Fix issues where unsaved-changes warning is not\n displayed.\n * Login: Fixes Unauthorized message showing when on login page\n or snapshot page.\n * NodeGraph: Fix sorting markers in grid view.\n * Short URL: Include orgId in generated short URLs.\n * Variables: Support raw values of boolean type.\n * Admin: Fix infinite loading edit on the profile page.\n * Color: Fix issues with random colors in string and date\n fields.\n * Dashboard: Fix issue with title or folder change has no\n effect after exiting settings view.\n * DataLinks: Fix an issue __series.name is not working in data\n link.\n * Datasource: Fix dataproxy timeout should always be applied\n for outgoing data source HTTP requests.\n * Elasticsearch: Fix NewClient not passing httpClientProvider\n to client impl.\n * Explore: Fix Browser title not updated on Navigation to\n Explore.\n * GraphNG: Remove fieldName and hideInLegend properties from\n UPlotSeriesBuilder.\n * OAuth: Fix fallback to auto_assign_org_role setting for Azure\n AD OAuth when no role claims exists.\n * PanelChrome: Fix issue with empty panel after adding a non\n data panel and coming back from panel edit.\n * StatPanel: Fix data link tooltip not showing for single\n value.\n * Table: Fix sorting for number fields.\n * Table: Have text underline for datalink, and add support for\n image datalink.\n * Time series panel: Position tooltip correctly when window is\n scrolled or resized.\n * Transformations: Prevent FilterByValue transform from\n crashing panel edit.\n * Annotations panel: Remove subpath from dashboard links.\n * Content Security Policy: Allow all image sources by default.\n * Content Security Policy: Relax default template wrt. loading\n of scripts, due to nonces not working.\n * Datasource: Fix tracing propagation for alert execution by\n introducing HTTP client outgoing tracing middleware.\n * InfluxDB: InfluxQL always apply time interval end.\n * Library Panels: Fixes \u0027error while loading library panels\u0027.\n * NewsPanel: Fixes rendering issue in Safari.\n * PanelChrome: Fix queries being issued again when scrolling in\n and out of view.\n * Plugins: Fix Azure token provider cache panic and auth param\n nil value.\n * Snapshots: Fix key and deleteKey being ignored when creating\n an external snapshot.\n * Table: Fix issue with cell border not showing with colored\n background cells.\n * Table: Makes tooltip scrollable for long JSON values.\n * TimeSeries: Fix for Connected null values threshold toggle\n during panel editing.\n * Variables: Fixes inconsistent selected states on dashboard\n load.\n * Variables: Refreshes all panels even if panel is full screen.\n * APIKeys: Fixes issue with adding first api key.\n * Alerting: Add checks for non supported units - disable\n defaulting to seconds.\n * Alerting: Fix issue where Slack notifications won\u0027t link to\n user IDs.\n * Alerting: Omit empty message in PagerDuty notifier.\n * AzureMonitor: Fix migration error from older versions of App\n Insights queries.\n * CloudWatch: Fix AWS/Connect dimensions.\n * CloudWatch: Fix broken AWS/MediaTailor dimension name.\n * Dashboards: Allow string manipulation as advanced variable\n format option.\n * DataLinks: Includes harmless extended characters like\n Cyrillic characters.\n * Drawer: Fixes title overflowing its container.\n * Explore: Fix issue when some query errors were not shown.\n * Generic OAuth: Prevent adding duplicated users.\n * Graphite: Handle invalid annotations.\n * Graphite: Fix autocomplete when tags are not available.\n * InfluxDB: Fix Cannot read property \u0027length\u0027 of undefined in\n when parsing response.\n * Instrumentation: Enable tracing when Jaeger host and port are\n set.\n * Instrumentation: Prefix metrics with grafana.\n * MSSQL: By default let driver choose port.\n * OAuth: Add optional strict parsing of role_attribute_path.\n * Panel: Fixes description markdown with inline code being\n rendered on newlines and full width.\n * PanelChrome: Ignore data updates \u0026 errors for non data\n panels.\n * Permissions: Fix inherited folder permissions can prevent new\n permissions being added to a dashboard.\n * Plugins: Remove pre-existing plugin installs when installing\n with grafana-cli.\n * Plugins: Support installing to folders with whitespace and\n fix pluginUrl trailing and leading whitespace failures.\n * Postgres/MySQL/MSSQL: Don\u0027t return connection failure details\n to the client.\n * Postgres: Fix ms precision of interval in time group macro\n when TimescaleDB is enabled.\n * Provisioning: Use dashboard checksum field as change\n indicator.\n * SQL: Fix so that all captured errors are returned from sql\n engine.\n * Shortcuts: Fixes panel shortcuts so they always work.\n * Table: Fixes so border is visible for cells with links.\n * Variables: Clear query when data source type changes.\n * Variables: Filters out builtin variables from unknown list.\n * Variables: Refreshes all panels even if panel is full screen.\n * Alerting: Fix NoDataFound for alert rules using AND operator.\n\n- Features and enhancements:\n * Alerting: Allow configuration of non-ready alertmanagers.\n * Alerting: Allow customization of Google chat message.\n * AppPlugins: Support app plugins with only default nav.\n * InfluxDB: query editor: skip fields in metadata queries.\n * Postgres/MySQL/MSSQL: Cancel in-flight SQL query if user cancels query in grafana.\n * Prometheus: Forward oauth tokens after prometheus datasource migration.\n * BarChart: Use new data error view component to show actions in panel edit.\n * CloudMonitor: Iterate over pageToken for resources.\n * Macaron: Prevent WriteHeader invalid HTTP status code panic\n * Alerting: Prevent folders from being deleted when they contain alerts.\n * Alerting: Show full preview value in tooltip.\n * BarGauge: Limit title width when name is really long.\n * CloudMonitoring: Avoid to escape regexps in filters.\n * CloudWatch: Add support for AWS Metric Insights.\n * TooltipPlugin: Remove other panels\u0027 shared tooltip in edit panel.\n * Visualizations: Limit y label width to 40% of visualization width.\n * Alerting: Create DatasourceError alert if evaluation returns error.\n * Alerting: Make Unified Alerting enabled by default for those who do not use legacy alerting.\n * Alerting: Support mute timings configuration through the api for the embedded alert manager.\n * CloudWatch: Add missing AWS/Events metrics.\n * Docs: Add easier to find deprecation notices to certain data sources and to the changelog.\n * Plugins Catalog: Enable install controls based on the pluginAdminEnabled flag.\n * Table: Add space between values for the DefaultCell and JSONViewCell.\n * Tracing: Make query editors available in dashboard for Tempo and Zipkin.\n * Alerting: Add UI for contact point testing with custom annotations and labels.\n * Alerting: Make alert state indicator in panel header work with Grafana 8 alerts.\n * Alerting: Option for Discord notifier to use webhook name.\n * Annotations: Deprecate AnnotationsSrv.\n * Auth: Omit all base64 paddings in JWT tokens for the JWT auth.\n * Azure Monitor: Clean up fields when editing Metrics.\n * AzureMonitor: Add new starter dashboards.\n * AzureMonitor: Add starter dashboard for app monitoring with Application Insights.\n * Barchart/Time series: Allow x axis label.\n * CLI: Improve error handling for installing plugins.\n * CloudMonitoring: Migrate to use backend plugin SDK contracts.\n * CloudWatch Logs: Add retry strategy for hitting max concurrent queries.\n * CloudWatch: Add AWS RoboMaker metrics and dimension.\n * CloudWatch: Add AWS Transfer metrics and dimension.\n * Dashboard: replace datasource name with a reference object.\n * Dashboards: Show logs on time series when hovering.\n * Elasticsearch: Add support for Elasticsearch 8.0 (Beta).\n * Elasticsearch: Add time zone setting to Date Histogram aggregation.\n * Elasticsearch: Enable full range log volume histogram.\n * Elasticsearch: Full range logs volume.\n * Explore: Allow changing the graph type.\n * Explore: Show ANSI colors when highlighting matched words in the logs panel.\n * Graph(old) panel: Listen to events from Time series panel.\n * Import: Load gcom dashboards from URL.\n * LibraryPanels: Improves export and import of library panels between orgs.\n * OAuth: Support PKCE.\n * Panel edit: Overrides now highlight correctly when searching.\n * PanelEdit: Display drag indicators on draggable sections.\n * Plugins: Refactor Plugin Management.\n * Prometheus: Add custom query parameters when creating PromLink url.\n * Prometheus: Remove limits on metrics, labels, and values in Metrics Browser.\n * StateTimeline: Share cursor with rest of the panels.\n * Tempo: Add error details when json upload fails.\n * Tempo: Add filtering for service graph query.\n * Tempo: Add links to nodes in Service Graph pointing to Prometheus metrics.\n * Time series/Bar chart panel: Add ability to sort series via legend.\n * TimeSeries: Allow multiple axes for the same unit.\n * TraceView: Allow span links defined on dataFrame.\n * Transformations: Support a rows mode in labels to fields.\n * ValueMappings: Don\u0027t apply field config defaults to time fields.\n * Variables: Only update panels that are impacted by variable change.\n * Annotations: We have improved tag search performance.\n * Application: You can now configure an error-template title.\n * AzureMonitor: We removed a restriction from the resource filter query.\n * Packaging: We removed the ProcSubset option in systemd. This option prevented Grafana from starting in \n LXC environments.\n * Prometheus: We removed the autocomplete limit for metrics.\n * Table: We improved the styling of the type icons to make them more distinct from column / field name.\n * ValueMappings: You can now use value mapping in stat, gauge, bar gauge, and pie chart visualizations.\n * AWS: Updated AWS authentication documentation.\n * Alerting: Added support Alertmanager data source for upstream Prometheus AM implementation.\n * Alerting: Allows more characters in label names so notifications are sent.\n * Alerting: Get alert rules for a dashboard or a panel using `/api/v1/rules` endpoints.\n * Annotations: Improved rendering performance of event markers.\n * CloudWatch Logs: Skip caching for log queries.\n * Explore: Added an opt-in configuration for Node Graph in Jaeger, Zipkin, and Tempo.\n * Packaging: Add stricter systemd unit options.\n * Prometheus: Metrics browser can now handle label values with special characters.\n * AccessControl: Document new permissions restricting data source access.\n * TimePicker: Add fiscal years and search to time picker.\n * Alerting: Added support for Unified Alerting with Grafana HA.\n * Alerting: Added support for tune rule evaluation using configuration options.\n * Alerting: Cleanups alertmanager namespace from key-value store when disabling Grafana 8 alerts.\n * Alerting: Remove ngalert feature toggle and introduce two new settings for enabling Grafana 8 alerts and \n disabling them for specific organisations.\n * CloudWatch: Introduced new math expression where it is necessary to specify the period field.\n * InfluxDB: Added support for `$__interval` and `$__interval_ms` inFlux queries for alerting.\n * InfluxDB: Flux queries can use more precise start and end timestamps with nanosecond-precision.\n * Plugins Catalog: Make the catalog the default way to interact with plugins.\n * Prometheus: Removed autocomplete limit for metrics.\n * AccessControl: Introduce new permissions to restrict access for reloading provisioning configuration.\n * Alerting: Add UI to edit Cortex/Loki namespace, group names, and group evaluation interval.\n * Alerting: Add a Test button to test contact point.\n * Alerting: Allow creating/editing recording rules for Loki and Cortex.\n * Alerting: Metrics should have the label org instead of user.\n * Alerting: Sort notification channels by name to make them easier to locate.\n * Alerting: Support org level isolation of notification configuration.\n * AzureMonitor: Add data links to deep link to Azure Portal Azure Resource Graph.\n * AzureMonitor: Add support for annotations from Azure Monitor Metrics and Azure Resource Graph services.\n * AzureMonitor: Show error message when subscriptions request fails in ConfigEditor.\n * CloudWatch Logs: Add link to X-Ray data source for trace IDs in logs.\n * CloudWatch Logs: Disable query path using websockets (Live) feature.\n * CloudWatch/Logs: Don\u0027t group dataframes for non time series queries.\n * Cloudwatch: Migrate queries that use multiple stats to one query per stat.\n * Dashboard: Keep live timeseries moving left (v2).\n * Datasources: Introduce response_limit for datasource responses.\n * Explore: Add filter by trace or span ID to trace to logs feature.\n * Explore: Download traces as JSON in Explore Inspector.\n * Explore: Reuse Dashboard\u0027s QueryRows component.\n * Explore: Support custom display label for derived fields buttons for Loki datasource.\n * Grafana UI: Update monaco-related dependencies.\n * Graphite: Deprecate browser access mode.\n * InfluxDB: Improve handling of intervals in alerting.\n * InfluxDB: InfluxQL query editor: Handle unusual characters in tag values better.\n * Jaeger: Add ability to upload JSON file for trace data.\n * LibraryElements: Enable specifying UID for new and existing library elements.\n * LibraryPanels: Remove library panel icon from the panel header so you can no longer tell that a panel is a \n library panel from the dashboard view.\n * Logs panel: Scroll to the bottom on page refresh when sorting in ascending order.\n * Loki: Add fuzzy search to label browser.\n * Navigation: Implement active state for items in the Sidemenu.\n * Packaging: Add stricter systemd unit options.\n * Packaging: Update PID file location from /var/run to /run.\n * Plugins: Add Hide OAuth Forward config option.\n * Postgres/MySQL/MSSQL: Add setting to limit the maximum number of rows processed.\n * Prometheus: Add browser access mode deprecation warning.\n * Prometheus: Add interpolation for built-in-time variables to backend.\n * Tempo: Add ability to upload trace data in JSON format.\n * TimeSeries/XYChart: Allow grid lines visibility control in XYChart and TimeSeries panels.\n * Transformations: Convert field types to time string number or boolean.\n * Value mappings: Add regular-expression based value mapping.\n * Zipkin: Add ability to upload trace JSON.\n * Explore: Ensure logs volume bar colors match legend colors.\n * LDAP: Search all DNs for users.\n * AzureMonitor: Add support for PostgreSQL and MySQL Flexible Servers.\n * Datasource: Change HTTP status code for failed datasource\n health check to 400.\n * Explore: Add span duration to left panel in trace viewer.\n * Plugins: Use file extension allowlist when serving plugin\n assets instead of checking for UNIX executable.\n * Profiling: Add support for binding pprof server to custom\n network interfaces.\n * Search: Make search icon keyboard navigable.\n * Template variables: Keyboard navigation improvements.\n * Tooltip: Display ms within minute time range.\n * Alerting: Deduplicate receivers during migration.\n * ColorPicker: Display colors as RGBA.\n * Select: Make portalling the menu opt-in, but opt-in everywhere.\n * TimeRangePicker: Improve accessibility.\n * Alerting: Support label matcher syntax in alert rule list filter.\n * IconButton: Put tooltip text as aria-label.\n * Live: Experimental HA with Redis.\n * UI: FileDropzone component.\n * CloudWatch: Add AWS LookoutMetrics.\n * Alerting: Expand the value string in alert annotations and labels.\n * Auth: Add Azure HTTP authentication middleware.\n * Auth: Auth: Pass user role when using the authentication proxy.\n * Gazetteer: Update countries.json file to allow for linking to 3-letter country codes.\n * Alerting: Add Alertmanager notifications tab.\n * Alerting: Add button to deactivate current Alertmanager\n configuration.\n * Alerting: Add toggle in Loki/Prometheus data source\n configuration to opt out of alerting UI.\n * Alerting: Allow any \u0027evaluate for\u0027 value \u003e=0 in the alert\n rule form.\n * Alerting: Load default configuration from status endpoint, if\n Cortex Alertmanager returns empty user configuration. \n * Alerting: view to display alert rule and its underlying data.\n * Annotation panel: Release the annotation panel.\n * Annotations: Add typeahead support for tags in built-in\n annotations.\n * AzureMonitor: Add curated dashboards for Azure services.\n * AzureMonitor: Add support for deep links to Microsoft Azure\n portal for Metrics.\n * AzureMonitor: Remove support for different credentials for\n Azure Monitor Logs.\n * AzureMonitor: Support querying any Resource for Logs queries.\n * Elasticsearch: Add frozen indices search support.\n * Elasticsearch: Name fields after template variables values\n instead of their name.\n * Elasticsearch: add rate aggregation.\n * Email: Allow configuration of content types for email\n notifications.\n * Explore: Add more meta information when line limit is hit.\n * Explore: UI improvements to trace view.\n * FieldOverrides: Added support to change display name in an\n override field and have it be matched by a later rule.\n * HTTP Client: Introduce dataproxy_max_idle_connections config\n variable.\n * InfluxDB: InfluxQL: adds tags to timeseries data.\n * InfluxDB: InfluxQL: make measurement search case insensitive.\n Legacy Alerting: Replace simplejson with a struct in webhook\n notification channel.\n * Legend: Updates display name for Last (not null) to just\n Last*.\n * Logs panel: Add option to show common labels.\n * Loki: Add $__range variable.\n * Loki: Add support for \u0027label_values(log stream selector,\n label)\u0027 in templating.\n * Loki: Add support for ad-hoc filtering in dashboard.\n * MySQL Datasource: Add timezone parameter.\n * NodeGraph: Show gradient fields in legend.\n * PanelOptions: Don\u0027t mutate panel options/field config object\n when updating.\n * PieChart: Make pie gradient more subtle to match other\n charts.\n * Prometheus: Update PromQL typeahead and highlighting.\n * Prometheus: interpolate variable for step field.\n * Provisioning: Improve validation by validating across all\n dashboard providers.\n * SQL Datasources: Allow multiple string/labels columns with\n time series.\n * Select: Portal select menu to document.body.\n * Team Sync: Add group mapping to support team sync in the\n Generic OAuth provider.\n * Tooltip: Make active series more noticeable.\n * Tracing: Add support to configure trace to logs start and end\n time.\n * Transformations: Skip merge when there is only a single data\n frame.\n * ValueMapping: Added support for mapping text to color,\n boolean values, NaN and Null. Improved UI for value mapping.\n * Visualizations: Dynamically set any config (min, max, unit,\n color, thresholds) from query results.\n * live: Add support to handle origin without a value for the\n port when matching with root_url.\n * Alerting: Add annotation upon alert state change.\n * Alerting: Allow space in label and annotation names.\n * InfluxDB: Improve legend labels for InfluxDB query results.\n * Cloudwatch Logs: Send error down to client.\n * Folders: Return 409 Conflict status when folder already\n exists.\n * TimeSeries: Do not show series in tooltip if it\u0027s hidden in\n the viz.\n * Live: Rely on app url for origin check.\n * PieChart: Sort legend descending, update placeholder.\n * TimeSeries panel: Do not reinitialize plot when thresholds\n mode change.\n * Alerting: Increase alertmanager_conf column if MySQL.\n * Time series/Bar chart panel: Handle infinite numbers as nulls\n when converting to plot array.\n * TimeSeries: Ensure series overrides that contain color are\n migrated, and migrate the previous fieldConfig when changing\n the panel type.\n * ValueMappings: Improve singlestat value mappings migration.\n * Datasource: Add support for max_conns_per_host in dataproxy\n settings.\n * AzureMonitor: Require default subscription for workspaces()\n template variable query.\n * AzureMonitor: Use resource type display names in the UI.\n * Dashboard: Remove support for loading and deleting dashboard\n by slug.\n * InfluxDB: Deprecate direct browser access in data source.\n * VizLegend: Add a read-only property.\n * API: Support folder UID in dashboards API.\n * Alerting: Add support for configuring avatar URL for the\n Discord notifier.\n * Alerting: Clarify that Threema Gateway Alerts support only\n Basic IDs.\n * Azure: Expose Azure settings to external plugins.\n * AzureMonitor: Deprecate using separate credentials for Azure\n Monitor Logs.\n * AzureMonitor: Display variables in resource picker for Azure\n Monitor Logs.\n * AzureMonitor: Hide application insights for data sources not\n using it.\n * AzureMonitor: Support querying subscriptions and resource\n groups in Azure Monitor Logs.\n * AzureMonitor: remove requirement for default subscription.\n * CloudWatch: Add Lambda@Edge Amazon CloudFront metrics.\n * CloudWatch: Add missing AWS AppSync metrics.\n * ConfirmModal: Auto focus delete button.\n * Explore: Add caching for queries that are run from logs\n navigation.\n * Loki: Add formatting for annotations.\n * Loki: Bring back processed bytes as meta information.\n * NodeGraph: Display node graph collapsed by default with trace\n view.\n * Overrides: Include a manual override option to hide something\n from visualization.\n * PieChart: Support row data in pie charts.\n * Prometheus: Update default HTTP method to POST for existing\n data sources.\n * Time series panel: Position tooltip correctly when window is\n scrolled or resized.\n * AppPlugins: Expose react-router to apps.\n * AzureMonitor: Add Azure Resource Graph.\n * AzureMonitor: Managed Identity configuration UI.\n * AzureMonitor: Token provider with support for Managed\n Identities.\n * AzureMonitor: Update Logs workspace() template variable query\n to return resource URIs.\n * BarChart: Value label sizing.\n * CloudMonitoring: Add support for preprocessing.\n * CloudWatch: Add AWS/EFS StorageBytes metric.\n * CloudWatch: Allow use of missing AWS namespaces using custom\n metrics.\n * Datasource: Shared HTTP client provider for core backend data\n sources and any data source using the data source proxy.\n * InfluxDB: InfluxQL: allow empty tag values in the query\n editor.\n * Instrumentation: Instrument incoming HTTP request with\n histograms by default.\n * Library Panels: Add name endpoint \u0026 unique name validation to\n AddLibraryPanelModal.\n * Logs panel: Support details view.\n * PieChart: Always show the calculation options dropdown in the\n editor.\n * PieChart: Remove beta flag.\n * Plugins: Enforce signing for all plugins.\n * Plugins: Remove support for deprecated backend plugin\n protocol version.\n * Tempo/Jaeger: Add better display name to legend.\n * Timeline: Add time range zoom.\n * Timeline: Adds opacity \u0026 line width option.\n * Timeline: Value text alignment option.\n * ValueMappings: Add duplicate action, and disable dismiss on\n backdrop click.\n * Zipkin: Add node graph view to trace response.\n * API: Add org users with pagination.\n * API: Return 404 when deleting nonexistent API key.\n * API: Return query results as JSON rather than base64 encoded\n Arrow.\n * Alerting: Allow sending notification tags to Opsgenie as\n extra properties.\n * Alerts: Replaces all uses of InfoBox \u0026 FeatureInfoBox with\n Alert.\n * Auth: Add support for JWT Authentication.\n * AzureMonitor: Add support for\n Microsoft.SignalRService/SignalR metrics.\n * AzureMonitor: Azure settings in Grafana server config.\n * AzureMonitor: Migrate Metrics query editor to React.\n * BarChart panel: enable series toggling via legend.\n * BarChart panel: Adds support for Tooltip in BarChartPanel.\n * PieChart panel: Change look of highlighted pie slices.\n * CloudMonitoring: Migrate config editor from angular to react.\n * CloudWatch: Add Amplify Console metrics and dimensions.\n * CloudWatch: Add missing Redshift metrics to CloudWatch data\n source.\n * CloudWatch: Add metrics for managed RabbitMQ service.\n * DashboardList: Enable templating on search tag input.\n * Datasource config: correctly remove single custom http\n header.\n * Elasticsearch: Add generic support for template variables.\n * Elasticsearch: Allow omitting field when metric supports\n inline script.\n * Elasticsearch: Allow setting a custom limit for log queries.\n * Elasticsearch: Guess field type from first non-empty value.\n * Elasticsearch: Use application/x-ndjson content type for\n multisearch requests.\n * Elasticsearch: Use semver strings to identify ES version.\n * Explore: Add logs navigation to request more logs.\n * Explore: Map Graphite queries to Loki.\n * Explore: Scroll split panes in Explore independently.\n * Explore: Wrap each panel in separate error boundary.\n * FieldDisplay: Smarter naming of stat values when visualising\n row values (all values) in stat panels.\n * Graphite: Expand metric names for variables.\n * Graphite: Handle unknown Graphite functions without breaking\n the visual editor.\n * Graphite: Show graphite functions descriptions.\n * Graphite: Support request cancellation properly (Uses new\n backendSrv.fetch Observable request API).\n * InfluxDB: Flux: Improve handling of complex\n response-structures.\n * InfluxDB: Support region annotations.\n * Inspector: Download logs for manual processing.\n * Jaeger: Add node graph view for trace.\n * Jaeger: Search traces.\n * Loki: Use data source settings for alerting queries.\n * NodeGraph: Exploration mode.\n * OAuth: Add support for empty scopes.\n * PanelChrome: New logic-less emotion based component with no\n dependency on PanelModel or DashboardModel.\n * PanelEdit: Adds a table view toggle to quickly view data in\n table form.\n * PanelEdit: Highlight matched words when searching options.\n * PanelEdit: UX improvements.\n * Plugins: PanelRenderer and simplified QueryRunner to be used\n from plugins.\n * Plugins: AuthType in route configuration and params\n interpolation.\n * Plugins: Enable plugin runtime install/uninstall\n capabilities.\n * Plugins: Support set body content in plugin routes.\n * Plugins: Introduce marketplace app.\n * Plugins: Moving the DataSourcePicker to grafana/runtime so it\n can be reused in plugins.\n * Prometheus: Add custom query params for alert and exemplars\n queries.\n * Prometheus: Use fuzzy string matching to autocomplete metric\n names and label.\n * Routing: Replace Angular routing with react-router.\n * Slack: Use chat.postMessage API by default.\n * Tempo: Search for Traces by querying Loki directly from\n Tempo.\n * Tempo: Show graph view of the trace.\n * Themes: Switch theme without reload using global shortcut.\n * TimeSeries panel: Add support for shared cursor.\n * TimeSeries panel: Do not crash the panel if there is no time\n series data in the response.\n * Variables: Do not save repeated panels, rows and scopedVars.\n * Variables: Removes experimental Tags feature.\n * Variables: Removes the never refresh option.\n * Visualizations: Unify tooltip options across visualizations.\n * Visualizations: Refactor and unify option creation between\n new visualizations.\n * Visualizations: Remove singlestat panel.\n\n- Plugin development fixes \u0026 changes:\n * Toolkit: Revert build config so tslib is bundled with plugins to prevent plugins from crashing.\n * Select: Select menus now properly scroll during keyboard navigation.\n * grafana/ui: Enable slider marks display.\n * Plugins: Create a mock icon component to prevent console errors.\n * Grafana UI: Fix TS error property css is missing in type.\n * Toolkit: Fix matchMedia not found error.\n * Toolkit: Improve error messages when tasks fail.\n * Toolkit: Resolve external fonts when Grafana is served from a\n sub path.\n * QueryField: Remove carriage return character from pasted text.\n * Button: Introduce buttonStyle prop.\n * DataQueryRequest: Remove deprecated props showingGraph and showingTabel and exploreMode.\n * grafana/ui: Update React Hook Form to v7.\n * IconButton: Introduce variant for red and blue icon buttons.\n * Plugins: Expose the getTimeZone function to be able to get the current selected timeZone.\n * TagsInput: Add className to TagsInput.\n * VizLegend: Move onSeriesColorChanged to PanelContext (breaking change).\n\n- Other changes:\n\n * Update to Go 1.17.\n * Add build-time dependency on `wire`.\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-1419,openSUSE-SLE-15.3-2022-1419,openSUSE-SLE-15.4-2022-1419", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-fu-2022_1419-1.json" }, { "category": "self", "summary": "URL for SUSE-FU-2022:1419-1", "url": "https://www.suse.com/support/update/announcement//suse-fu-20221419-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-FU-2022:1419-1", "url": "https://lists.suse.com/pipermail/sle-updates/2022-April/022823.html" }, { "category": "self", "summary": "SUSE Bug 1194873", "url": "https://bugzilla.suse.com/1194873" }, { "category": "self", "summary": "SUSE Bug 1195726", "url": "https://bugzilla.suse.com/1195726" }, { "category": "self", "summary": "SUSE Bug 1195727", "url": "https://bugzilla.suse.com/1195727" }, { "category": "self", "summary": "SUSE Bug 1195728", "url": "https://bugzilla.suse.com/1195728" }, { "category": "self", "summary": "SUSE CVE CVE-2021-36222 page", "url": "https://www.suse.com/security/cve/CVE-2021-36222/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3711 page", "url": "https://www.suse.com/security/cve/CVE-2021-3711/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39226 page", "url": "https://www.suse.com/security/cve/CVE-2021-39226/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41174 page", "url": "https://www.suse.com/security/cve/CVE-2021-41174/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41244 page", "url": "https://www.suse.com/security/cve/CVE-2021-41244/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43798 page", "url": "https://www.suse.com/security/cve/CVE-2021-43798/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43813 page", "url": "https://www.suse.com/security/cve/CVE-2021-43813/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43815 page", "url": "https://www.suse.com/security/cve/CVE-2021-43815/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21673 page", "url": "https://www.suse.com/security/cve/CVE-2022-21673/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21702 page", "url": "https://www.suse.com/security/cve/CVE-2022-21702/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21703 page", "url": "https://www.suse.com/security/cve/CVE-2022-21703/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21713 page", "url": "https://www.suse.com/security/cve/CVE-2022-21713/" } ], "title": "Feature update for grafana", "tracking": { "current_release_date": "2022-04-27T07:20:15Z", "generator": { "date": "2022-04-27T07:20:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-FU-2022:1419-1", "initial_release_date": "2022-04-27T07:20:15Z", "revision_history": [ { "date": "2022-04-27T07:20:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "grafana-8.3.5-150200.3.21.1.aarch64", "product": { "name": "grafana-8.3.5-150200.3.21.1.aarch64", "product_id": "grafana-8.3.5-150200.3.21.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "grafana-8.3.5-150200.3.21.1.i586", "product": { "name": "grafana-8.3.5-150200.3.21.1.i586", "product_id": "grafana-8.3.5-150200.3.21.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "grafana-8.3.5-150200.3.21.1.ppc64le", "product": { "name": "grafana-8.3.5-150200.3.21.1.ppc64le", "product_id": "grafana-8.3.5-150200.3.21.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "grafana-8.3.5-150200.3.21.1.s390x", "product": { "name": "grafana-8.3.5-150200.3.21.1.s390x", "product_id": "grafana-8.3.5-150200.3.21.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "grafana-8.3.5-150200.3.21.1.x86_64", "product": { "name": "grafana-8.3.5-150200.3.21.1.x86_64", "product_id": "grafana-8.3.5-150200.3.21.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "grafana-8.3.5-150200.3.21.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64" }, "product_reference": "grafana-8.3.5-150200.3.21.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.3.5-150200.3.21.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le" }, "product_reference": "grafana-8.3.5-150200.3.21.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.3.5-150200.3.21.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x" }, "product_reference": "grafana-8.3.5-150200.3.21.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.3.5-150200.3.21.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64" }, "product_reference": "grafana-8.3.5-150200.3.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.3.5-150200.3.21.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64" }, "product_reference": "grafana-8.3.5-150200.3.21.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.3.5-150200.3.21.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le" }, "product_reference": "grafana-8.3.5-150200.3.21.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.3.5-150200.3.21.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x" }, "product_reference": "grafana-8.3.5-150200.3.21.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.3.5-150200.3.21.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" }, "product_reference": "grafana-8.3.5-150200.3.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-36222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-36222" } ], "notes": [ { "category": "general", "text": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-36222", "url": "https://www.suse.com/security/cve/CVE-2021-36222" }, { "category": "external", "summary": "SUSE Bug 1188571 for CVE-2021-36222", "url": "https://bugzilla.suse.com/1188571" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-27T07:20:15Z", "details": "important" } ], "title": "CVE-2021-36222" }, { "cve": "CVE-2021-3711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3711" } ], "notes": [ { "category": "general", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3711", "url": "https://www.suse.com/security/cve/CVE-2021-3711" }, { "category": "external", "summary": "SUSE Bug 1189520 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1189520" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1205663 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1205663" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-27T07:20:15Z", "details": "critical" } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2021-39226", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39226" } ], "notes": [ { "category": "general", "text": "Grafana is an open source data visualization platform. In affected versions unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: /dashboard/snapshot/:key, or /api/snapshots/:key. If the snapshot \"public_mode\" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: /api/snapshots-delete/:deleteKey. Regardless of the snapshot \"public_mode\" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: /api/snapshots/:key, or /api/snapshots-delete/:deleteKey. The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss. This issue has been resolved in versions 8.1.6 and 7.5.11. If for some reason you cannot upgrade you can use a reverse proxy or similar to block access to the literal paths: /api/snapshots/:key, /api/snapshots-delete/:deleteKey, /dashboard/snapshot/:key, and /api/snapshots/:key. They have no normal function and can be disabled without side effects.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39226", "url": "https://www.suse.com/security/cve/CVE-2021-39226" }, { "category": "external", "summary": "SUSE Bug 1191454 for CVE-2021-39226", "url": "https://bugzilla.suse.com/1191454" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-27T07:20:15Z", "details": "important" } ], "title": "CVE-2021-39226" }, { "cve": "CVE-2021-41174", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41174" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions if an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim\u0027s browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} ex: {{constructor.constructor(\u0027alert(1)\u0027)()}}. When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. Users are advised to upgrade as soon as possible. If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string {{ in the path.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41174", "url": "https://www.suse.com/security/cve/CVE-2021-41174" }, { "category": "external", "summary": "SUSE Bug 1192383 for CVE-2021-41174", "url": "https://bugzilla.suse.com/1192383" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-27T07:20:15Z", "details": "moderate" } ], "title": "CVE-2021-41174" }, { "cve": "CVE-2021-41244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41244" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions when the fine-grained access control beta feature is enabled and there is more than one organization in the Grafana instance admins are able to access users from other organizations. Grafana 8.0 introduced a mechanism which allowed users with the Organization Admin role to list, add, remove, and update users\u0027 roles in other organizations in which they are not an admin. With fine-grained access control enabled, organization admins can list, add, remove and update users\u0027 roles in another organization, where they do not have organization admin role. All installations between v8.0 and v8.2.3 that have fine-grained access control beta enabled and more than one organization should be upgraded as soon as possible. If you cannot upgrade, you should turn off the fine-grained access control using a feature flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41244", "url": "https://www.suse.com/security/cve/CVE-2021-41244" }, { "category": "external", "summary": "SUSE Bug 1192763 for CVE-2021-41244", "url": "https://bugzilla.suse.com/1192763" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-27T07:20:15Z", "details": "critical" } ], "title": "CVE-2021-41244" }, { "cve": "CVE-2021-43798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43798" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `\u003cgrafana_host_url\u003e/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43798", "url": "https://www.suse.com/security/cve/CVE-2021-43798" }, { "category": "external", "summary": "SUSE Bug 1193492 for CVE-2021-43798", "url": "https://bugzilla.suse.com/1193492" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-27T07:20:15Z", "details": "important" } ], "title": "CVE-2021-43798" }, { "cve": "CVE-2021-43813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43813" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 contains a directory traversal vulnerability for fully lowercase or fully uppercase .md files. The vulnerability is limited in scope, and only allows access to files with the extension .md to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Users should upgrade to patched versions 8.3.2 or 7.5.12. For users who cannot upgrade, running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths. Alternatively, for fully lowercase or fully uppercase .md files, users can block /api/plugins/.*/markdown/.* without losing any functionality beyond inlined plugin help text.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43813", "url": "https://www.suse.com/security/cve/CVE-2021-43813" }, { "category": "external", "summary": "SUSE Bug 1193686 for CVE-2021-43813", "url": "https://bugzilla.suse.com/1193686" }, { "category": "external", "summary": "SUSE Bug 1193688 for CVE-2021-43813", "url": "https://bugzilla.suse.com/1193688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-27T07:20:15Z", "details": "moderate" } ], "title": "CVE-2021-43813" }, { "cve": "CVE-2021-43815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43815" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 has a directory traversal for arbitrary .csv files. It only affects instances that have the developer testing tool called TestData DB data source enabled and configured. The vulnerability is limited in scope, and only allows access to files with the extension .csv to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Versions 8.3.2 and 7.5.12 contain a patch for this issue. There is a workaround available for users who cannot upgrade. Running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43815", "url": "https://www.suse.com/security/cve/CVE-2021-43815" }, { "category": "external", "summary": "SUSE Bug 1193686 for CVE-2021-43815", "url": "https://bugzilla.suse.com/1193686" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-27T07:20:15Z", "details": "moderate" } ], "title": "CVE-2021-43815" }, { "cve": "CVE-2022-21673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21673" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions when a data source has the Forward OAuth Identity feature enabled, sending a query to that datasource with an API token (and no other user credentials) will forward the OAuth Identity of the most recently logged-in user. This can allow API token holders to retrieve data for which they may not have intended access. This attack relies on the Grafana instance having data sources that support the Forward OAuth Identity feature, the Grafana instance having a data source with the Forward OAuth Identity feature toggled on, the Grafana instance having OAuth enabled, and the Grafana instance having usable API keys. This issue has been patched in versions 7.5.13 and 8.3.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21673", "url": "https://www.suse.com/security/cve/CVE-2022-21673" }, { "category": "external", "summary": "SUSE Bug 1194873 for CVE-2022-21673", "url": "https://bugzilla.suse.com/1194873" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-27T07:20:15Z", "details": "moderate" } ], "title": "CVE-2022-21673" }, { "cve": "CVE-2022-21702", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21702" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site Scripting (XSS) attack. The attacker could either compromise an existing datasource for a specific Grafana instance or either set up its own public service and instruct anyone to set it up in their Grafana instance. To be impacted, all of the following must be applicable. For the data source proxy: A Grafana HTTP-based datasource configured with Server as Access Mode and a URL set, the attacker has to be in control of the HTTP server serving the URL of above datasource, and a specially crafted link pointing at the attacker controlled data source must be clicked on by an authenticated user. For the plugin proxy: A Grafana HTTP-based app plugin configured and enabled with a URL set, the attacker has to be in control of the HTTP server serving the URL of above app, and a specially crafted link pointing at the attacker controlled plugin must be clocked on by an authenticated user. For the backend plugin resource: An attacker must be able to navigate an authenticated user to a compromised plugin through a crafted link. Users are advised to update to a patched version. There are no known workarounds for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21702", "url": "https://www.suse.com/security/cve/CVE-2022-21702" }, { "category": "external", "summary": "SUSE Bug 1195726 for CVE-2022-21702", "url": "https://bugzilla.suse.com/1195726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-27T07:20:15Z", "details": "moderate" } ], "title": "CVE-2022-21702" }, { "cve": "CVE-2022-21703", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21703" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21703", "url": "https://www.suse.com/security/cve/CVE-2022-21703" }, { "category": "external", "summary": "SUSE Bug 1195727 for CVE-2022-21703", "url": "https://bugzilla.suse.com/1195727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-27T07:20:15Z", "details": "moderate" } ], "title": "CVE-2022-21703" }, { "cve": "CVE-2022-21713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21713" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Affected versions of Grafana expose multiple API endpoints which do not properly handle user authorization. `/teams/:teamId` will allow an authenticated attacker to view unintended data by querying for the specific team ID, `/teams/:search` will allow an authenticated attacker to search for teams and see the total number of available teams, including for those teams that the user does not have access to, and `/teams/:teamId/members` when editors_can_admin flag is enabled, an authenticated attacker can see unintended data by querying for the specific team ID. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21713", "url": "https://www.suse.com/security/cve/CVE-2022-21713" }, { "category": "external", "summary": "SUSE Bug 1195728 for CVE-2022-21713", "url": "https://bugzilla.suse.com/1195728" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.3:grafana-8.3.5-150200.3.21.1.x86_64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.aarch64", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.ppc64le", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.s390x", "openSUSE Leap 15.4:grafana-8.3.5-150200.3.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-27T07:20:15Z", "details": "moderate" } ], "title": "CVE-2022-21713" } ] }
suse-su-2022:1396-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for SUSE Manager Client Tools", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update fixes the following issues:\n\ngrafana:\n\n- Update from version 7.5.12 to version 8.3.5 (jsc#SLE-23439, jsc#SLE-23422)\n + Security:\n * Fixes XSS vulnerability in handling data sources\n (bsc#1195726, CVE-2022-21702)\n * Fixes cross-origin request forgery vulnerability\n (bsc#1195727, CVE-2022-21703)\n * Fixes Insecure Direct Object Reference vulnerability in Teams API (bsc#1195728, CVE-2022-21713)\n- Update to Go 1.17.\n- Add build-time dependency on `wire`.\n- Update license to GNU Affero General Public License v3.0.\n- Update to version 8.3.4\n * GetUserInfo: return an error if no user was found\n (bsc#1194873, CVE-2022-21673)\n + Features and enhancements:\n * Alerting: Allow configuration of non-ready alertmanagers.\n * Alerting: Allow customization of Google chat message.\n * AppPlugins: Support app plugins with only default nav.\n * InfluxDB: query editor: skip fields in metadata queries.\n * Postgres/MySQL/MSSQL: Cancel in-flight SQL query if user\n cancels query in grafana.\n * Prometheus: Forward oauth tokens after prometheus datasource\n migration.\n + Bug fixes:\n * Azure Monitor: Bug fix for variable interpolations in metrics\n dropdowns.\n * Azure Monitor: Improved error messages for variable queries.\n * CloudMonitoring: Fixes broken variable queries that use group\n bys.\n * Configuration: You can now see your expired API keys if you\n have no active ones.\n * Elasticsearch: Fix handling multiple datalinks for a single\n field.\n * Export: Fix error being thrown when exporting dashboards\n using query variables that reference the default datasource.\n * ImportDashboard: Fixes issue with importing dashboard and\n name ending up in uid.\n * Login: Page no longer overflows on mobile.\n * Plugins: Set backend metadata property for core plugins.\n * Prometheus: Fill missing steps with null values.\n * Prometheus: Fix interpolation of $__rate_interval variable.\n * Prometheus: Interpolate variables with curly brackets syntax.\n * Prometheus: Respect the http-method data source setting.\n * Table: Fixes issue with field config applied to wrong fields\n when hiding columns.\n * Toolkit: Fix bug with rootUrls not being properly parsed when\n signing a private plugin.\n * Variables: Fix so data source variables are added to adhoc\n configuration.\n + Plugin development fixes \u0026 changes:\n * Toolkit: Revert build config so tslib is bundled with plugins\n to prevent plugins from crashing.\n- Update to version 8.3.3:\n * BarChart: Use new data error view component to show actions\n in panel edit.\n * CloudMonitor: Iterate over pageToken for resources.\n * Macaron: Prevent WriteHeader invalid HTTP status code panic.\n * AnnoListPanel: Fix interpolation of variables in tags.\n * CloudWatch: Allow queries to have no dimensions specified.\n * CloudWatch: Fix broken queries for users migrating from\n 8.2.4/8.2.5 to 8.3.0.\n * CloudWatch: Make sure MatchExact flag gets the right value.\n * Dashboards: Fix so that empty folders can be deleted from the\n manage dashboards/folders page.\n * InfluxDB: Improve handling of metadata query errors in\n InfluxQL.\n * Loki: Fix adding of ad hoc filters for queries with parser\n and line_format expressions.\n * Prometheus: Fix running of exemplar queries for non-histogram\n metrics.\n * Prometheus: Interpolate template variables in interval.\n * StateTimeline: Fix toolitp not showing when for frames with\n multiple fields.\n * TraceView: Fix virtualized scrolling when trace view is\n opened in right pane in Explore.\n * Variables: Fix repeating panels for on time range changed\n variables.\n * Variables: Fix so queryparam option works for scoped\n- Update to version 8.3.2\n + Security: Fixes CVE-2021-43813 and CVE-2021-43815.\n- Update to version 8.3.1\n + Security: Fixes CVE-2021-43798.\n- Update to version 8.3.0\n * Alerting: Prevent folders from being deleted when they\n contain alerts.\n * Alerting: Show full preview value in tooltip.\n * BarGauge: Limit title width when name is really long.\n * CloudMonitoring: Avoid to escape regexps in filters.\n * CloudWatch: Add support for AWS Metric Insights.\n * TooltipPlugin: Remove other panels\u0027 shared tooltip in edit\n panel.\n * Visualizations: Limit y label width to 40% of visualization\n width.\n * Alerting: Clear alerting rule evaluation errors after\n intermittent failures.\n * Alerting: Fix refresh on legacy Alert List panel.\n * Dashboard: Fix queries for panels with non-integer widths.\n * Explore: Fix url update inconsistency.\n * Prometheus: Fix range variables interpolation for time ranges\n smaller than 1 second.\n * ValueMappings: Fixes issue with regex value mapping that only\n sets color.\n- Update to version 8.3.0-beta2\n + Breaking changes:\n * Grafana 8 Alerting enabled by default for installations that\n do not use legacy alerting.\n * Keep Last State for \u0027If execution error or timeout\u0027 when\n upgrading to Grafana 8 alerting.\n * Alerting: Create DatasourceError alert if evaluation returns\n error.\n * Alerting: Make Unified Alerting enabled by default for those\n who do not use legacy alerting.\n * Alerting: Support mute timings configuration through the api\n for the embedded alert manager.\n * CloudWatch: Add missing AWS/Events metrics.\n * Docs: Add easier to find deprecation notices to certain data\n sources and to the changelog.\n * Plugins Catalog: Enable install controls based on the\n pluginAdminEnabled flag.\n * Table: Add space between values for the DefaultCell and\n JSONViewCell.\n * Tracing: Make query editors available in dashboard for Tempo\n and Zipkin.\n * AccessControl: Renamed orgs roles, removed fixed:orgs:reader\n introduced in beta1.\n * Azure Monitor: Add trap focus for modals in grafana/ui and\n other small a11y fixes for Azure Monitor.\n * CodeEditor: Prevent suggestions from being clipped.\n * Dashboard: Fix cache timeout persistence.\n * Datasource: Fix stable sort order of query responses.\n * Explore: Fix error in query history when removing last item.\n * Logs: Fix requesting of older logs when flipped order.\n * Prometheus: Fix running of health check query based on access\n mode.\n * TextPanel: Fix suggestions for existing panels.\n * Tracing: Fix incorrect indentations due to reoccurring\n spanIDs.\n * Tracing: Show start time of trace with milliseconds\n precision.\n * Variables: Make renamed or missing variable section\n expandable.\n * Select: Select menus now properly scroll during keyboard\n navigation.\n- Update to version 8.3.0-beta1\n * Alerting: Add UI for contact point testing with custom\n annotations and labels.\n * Alerting: Make alert state indicator in panel header work\n with Grafana 8 alerts.\n * Alerting: Option for Discord notifier to use webhook name.\n * Annotations: Deprecate AnnotationsSrv.\n * Auth: Omit all base64 paddings in JWT tokens for the JWT\n auth.\n * Azure Monitor: Clean up fields when editing Metrics.\n * AzureMonitor: Add new starter dashboards.\n * AzureMonitor: Add starter dashboard for app monitoring with\n Application Insights.\n * Barchart/Time series: Allow x axis label.\n * CLI: Improve error handling for installing plugins.\n * CloudMonitoring: Migrate to use backend plugin SDK contracts.\n * CloudWatch Logs: Add retry strategy for hitting max\n concurrent queries.\n * CloudWatch: Add AWS RoboMaker metrics and dimension.\n * CloudWatch: Add AWS Transfer metrics and dimension.\n * Dashboard: replace datasource name with a reference object.\n * Dashboards: Show logs on time series when hovering.\n * Elasticsearch: Add support for Elasticsearch 8.0 (Beta).\n * Elasticsearch: Add time zone setting to Date Histogram\n aggregation.\n * Elasticsearch: Enable full range log volume histogram.\n * Elasticsearch: Full range logs volume.\n * Explore: Allow changing the graph type.\n * Explore: Show ANSI colors when highlighting matched words in\n the logs panel.\n * Graph(old) panel: Listen to events from Time series panel.\n * Import: Load gcom dashboards from URL.\n * LibraryPanels: Improves export and import of library panels\n between orgs.\n * OAuth: Support PKCE.\n * Panel edit: Overrides now highlight correctly when searching.\n * PanelEdit: Display drag indicators on draggable sections.\n * Plugins: Refactor Plugin Management.\n * Prometheus: Add custom query parameters when creating\n PromLink url.\n * Prometheus: Remove limits on metrics, labels, and values in\n Metrics Browser.\n * StateTimeline: Share cursor with rest of the panels.\n * Tempo: Add error details when json upload fails.\n * Tempo: Add filtering for service graph query.\n * Tempo: Add links to nodes in Service Graph pointing to\n Prometheus metrics.\n * Time series/Bar chart panel: Add ability to sort series via\n legend.\n * TimeSeries: Allow multiple axes for the same unit.\n * TraceView: Allow span links defined on dataFrame.\n * Transformations: Support a rows mode in labels to fields.\n * ValueMappings: Don\u0027t apply field config defaults to time\n fields.\n * Variables: Only update panels that are impacted by variable\n change.\n * API: Fix dashboard quota limit for imports.\n * Alerting: Fix rule editor issues with Azure Monitor data\n source.\n * Azure monitor: Make sure alert rule editor is not enabled\n when template variables are being used.\n * CloudMonitoring: Fix annotation queries.\n * CodeEditor: Trigger the latest getSuggestions() passed to\n CodeEditor.\n * Dashboard: Remove the current panel from the list of options\n in the Dashboard datasource.\n * Encryption: Fix decrypting secrets in alerting migration.\n * InfluxDB: Fix corner case where index is too large in ALIAS\n * NavBar: Order App plugins alphabetically.\n * NodeGraph: Fix zooming sensitivity on touchpads.\n * Plugins: Add OAuth pass-through logic to api/ds/query\n endpoint.\n * Snapshots: Fix panel inspector for snapshot data.\n * Tempo: Fix basic auth password reset on adding tag.\n * ValueMapping: Fixes issue with regex mappings.\n * grafana/ui: Enable slider marks display.\n- Update to version 8.2.7\n- Update to version 8.2.6\n * Security: Upgrade Docker base image to Alpine 3.14.3.\n * Security: Upgrade Go to 1.17.2.\n * TimeSeries: Fix fillBelowTo wrongly affecting fills of\n unrelated series.\n- Update to version 8.2.5\n * Fix No Data behaviour in Legacy Alerting.\n * Alerting: Fix a bug where the metric in the evaluation string\n was not correctly populated.\n * Alerting: Fix no data behaviour in Legacy Alerting for alert\n rules using the AND operator.\n * CloudMonitoring: Ignore min and max aggregation in MQL\n queries.\n * Dashboards: \u0027Copy\u0027 is no longer added to new dashboard\n titles.\n * DataProxy: Fix overriding response body when response is a\n WebSocket upgrade.\n * Elasticsearch: Use field configured in query editor as field\n for date_histogram aggregations.\n * Explore: Fix running queries without a datasource property\n set.\n * InfluxDB: Fix numeric aliases in queries.\n * Plugins: Ensure consistent plugin settings list response.\n * Tempo: Fix validation of float durations.\n * Tracing: Correct tags for each span are shown.\n- Update to version 8.2.4\n + Security: Fixes CVE-2021-41244.\n- Update to version 8.2.3\n + Security: Fixes CVE-2021-41174.\n- Update to version 8.2.2\n * Annotations: We have improved tag search performance.\n * Application: You can now configure an error-template title.\n * AzureMonitor: We removed a restriction from the resource\n filter query.\n * Packaging: We removed the ProcSubset option in systemd. This\n option prevented Grafana from starting in LXC environments.\n * Prometheus: We removed the autocomplete limit for metrics.\n * Table: We improved the styling of the type icons to make them\n more distinct from column / field name.\n * ValueMappings: You can now use value mapping in stat, gauge,\n bar gauge, and pie chart visualizations.\n * Alerting: Fix panic when Slack\u0027s API sends unexpected\n response.\n * Alerting: The Create Alert button now appears on the\n dashboard panel when you are working with a default\n datasource.\n * Explore: We fixed the problem where the Explore log panel\n disappears when an Elasticsearch logs query returns no\n results.\n * Graph: You can now see annotation descriptions on hover.\n * Logs: The system now uses the JSON parser only if the line is\n parsed to an object.\n * Prometheus: We fixed the issue where the system did not reuse\n TCP connections when querying from Grafana alerting.\n * Prometheus: We fixed the problem that resulted in an error\n when a user created a query with a $__interval min step.\n * RowsToFields: We fixed the issue where the system was not\n properly interpreting number values.\n * Scale: We fixed how the system handles NaN percent when data\n min = data max.\n * Table panel: You can now create a filter that includes\n special characters.\n- Update to version 8.2.1\n * Dashboard: Fix rendering of repeating panels.\n * Datasources: Fix deletion of data source if plugin is not\n found.\n * Packaging: Remove systemcallfilters sections from systemd\n unit files.\n * Prometheus: Add Headers to HTTP client options.\n- Update to version 8.2.0\n * AWS: Updated AWS authentication documentation.\n * Alerting: Added support Alertmanager data source for upstream\n Prometheus AM implementation.\n * Alerting: Allows more characters in label names so\n notifications are sent.\n * Alerting: Get alert rules for a dashboard or a panel using\n /api/v1/rules endpoints.\n * Annotations: Improved rendering performance of event markers.\n * CloudWatch Logs: Skip caching for log queries.\n * Explore: Added an opt-in configuration for Node Graph in\n Jaeger, Zipkin, and Tempo.\n * Packaging: Add stricter systemd unit options.\n * Prometheus: Metrics browser can now handle label values with\n * CodeEditor: Ensure that we trigger the latest onSave callback\n provided to the component.\n * DashboardList/AlertList: Fix for missing All folder value.\n * Plugins: Create a mock icon component to prevent console\n errors.\n- Update to version 8.2.0-beta2\n * AccessControl: Document new permissions restricting data\n source access.\n * TimePicker: Add fiscal years and search to time picker.\n * Alerting: Added support for Unified Alerting with Grafana HA.\n * Alerting: Added support for tune rule evaluation using\n configuration options.\n * Alerting: Cleanups alertmanager namespace from key-value\n store when disabling Grafana 8 alerts.\n * Alerting: Remove ngalert feature toggle and introduce two new\n settings for enabling Grafana 8 alerts and disabling them for\n specific organisations.\n * CloudWatch: Introduced new math expression where it is\n necessary to specify the period field.\n * InfluxDB: Added support for $__interval and $__interval_ms in\n Flux queries for alerting.\n * InfluxDB: Flux queries can use more precise start and end\n timestamps with nanosecond-precision.\n * Plugins Catalog: Make the catalog the default way to interact\n with plugins.\n * Prometheus: Removed autocomplete limit for metrics.\n * Alerting: Fixed an issue where the edit page crashes if you\n tried to preview an alert without a condition set.\n * Alerting: Fixed rules migration to keep existing Grafana 8\n alert rules.\n * Alerting: Fixed the silence file content generated during\n * Analytics: Fixed an issue related to interaction event\n propagation in Azure Application Insights.\n * BarGauge: Fixed an issue where the cell color was lit even\n though there was no data.\n * BarGauge: Improved handling of streaming data.\n * CloudMonitoring: Fixed INT64 label unmarshal error.\n * ConfirmModal: Fixes confirm button focus on modal open.\n * Dashboard: Add option to generate short URL for variables\n with values containing spaces.\n * Explore: No longer hides errors containing refId property.\n * Fixed an issue that produced State timeline panel tooltip\n error when data was not in sync.\n * InfluxDB: InfluxQL query editor is set to always use\n resultFormat.\n * Loki: Fixed creating context query for logs with parsed\n labels.\n * PageToolbar: Fixed alignment of titles.\n * Plugins Catalog: Update to the list of available panels after\n an install, update or uninstall.\n * TimeSeries: Fixed an issue where the shared cursor was not\n showing when hovering over in old Graph panel.\n * Variables: Fixed issues related to change of focus or refresh\n pages when pressing enter in a text box variable input.\n * Variables: Panel no longer crash when using the adhoc\n variable in data links.\n- Update to version 8.2.0-beta1\n * AccessControl: Introduce new permissions to restrict access\n for reloading provisioning configuration.\n * Alerting: Add UI to edit Cortex/Loki namespace, group names,\n and group evaluation interval.\n * Alerting: Add a Test button to test contact point.\n * Alerting: Allow creating/editing recording rules for Loki and\n Cortex.\n * Alerting: Metrics should have the label org instead of user.\n * Alerting: Sort notification channels by name to make them\n easier to locate.\n * Alerting: Support org level isolation of notification\n * AzureMonitor: Add data links to deep link to Azure Portal\n Azure Resource Graph.\n * AzureMonitor: Add support for annotations from Azure Monitor\n Metrics and Azure Resource Graph services.\n * AzureMonitor: Show error message when subscriptions request\n fails in ConfigEditor.\n * Chore: Update to Golang 1.16.7.\n * CloudWatch Logs: Add link to X-Ray data source for trace IDs\n in logs.\n * CloudWatch Logs: Disable query path using websockets (Live)\n feature.\n * CloudWatch/Logs: Don\u0027t group dataframes for non time series\n * Cloudwatch: Migrate queries that use multiple stats to one\n query per stat.\n * Dashboard: Keep live timeseries moving left (v2).\n * Datasources: Introduce response_limit for datasource\n responses.\n * Explore: Add filter by trace or span ID to trace to logs\n * Explore: Download traces as JSON in Explore Inspector.\n * Explore: Reuse Dashboard\u0027s QueryRows component.\n * Explore: Support custom display label for derived fields\n buttons for Loki datasource.\n * Grafana UI: Update monaco-related dependencies.\n * Graphite: Deprecate browser access mode.\n * InfluxDB: Improve handling of intervals in alerting.\n * InfluxDB: InfluxQL query editor: Handle unusual characters in\n tag values better.\n * Jaeger: Add ability to upload JSON file for trace data.\n * LibraryElements: Enable specifying UID for new and existing\n library elements.\n * LibraryPanels: Remove library panel icon from the panel\n header so you can no longer tell that a panel is a library\n panel from the dashboard view.\n * Logs panel: Scroll to the bottom on page refresh when sorting\n in ascending order.\n * Loki: Add fuzzy search to label browser.\n * Navigation: Implement active state for items in the Sidemenu.\n * Packaging: Update PID file location from /var/run to /run.\n * Plugins: Add Hide OAuth Forward config option.\n * Postgres/MySQL/MSSQL: Add setting to limit the maximum number\n of rows processed.\n * Prometheus: Add browser access mode deprecation warning.\n * Prometheus: Add interpolation for built-in-time variables to\n backend.\n * Tempo: Add ability to upload trace data in JSON format.\n * TimeSeries/XYChart: Allow grid lines visibility control in\n XYChart and TimeSeries panels.\n * Transformations: Convert field types to time string number or\n boolean.\n * Value mappings: Add regular-expression based value mapping.\n * Zipkin: Add ability to upload trace JSON.\n * Admin: Prevent user from deleting user\u0027s current/active\n organization.\n * LibraryPanels: Fix library panel getting saved in the\n dashboard\u0027s folder.\n * OAuth: Make generic teams URL and JMES path configurable.\n * QueryEditor: Fix broken copy-paste for mouse middle-click\n * Thresholds: Fix undefined color in \u0027Add threshold\u0027.\n * Timeseries: Add wide-to-long, and fix multi-frame output.\n * TooltipPlugin: Fix behavior of Shared Crosshair when Tooltip\n is set to All.\n * Grafana UI: Fix TS error property css is missing in type.\n- Update to version 8.1.8\n- Update to version 8.1.7\n * Alerting: Fix alerts with evaluation interval more than 30\n seconds resolving before notification.\n * Elasticsearch/Prometheus: Fix usage of proper SigV4 service\n namespace.\n- Update to version 8.1.6\n + Security: Fixes CVE-2021-39226.\n- Update to version 8.1.5\n * BarChart: Fixes panel error that happens on second refresh.\n- Update to version 8.1.4\n + Features and enhancements\n * Explore: Ensure logs volume bar colors match legend colors.\n * LDAP: Search all DNs for users.\n * Alerting: Fix notification channel migration.\n * Annotations: Fix blank panels for queries with unknown data\n sources.\n * BarChart: Fix stale values and x axis labels.\n * Graph: Make old graph panel thresholds work even if ngalert\n is enabled.\n * InfluxDB: Fix regex to identify / as separator.\n * LibraryPanels: Fix update issues related to library panels in\n rows.\n * Variables: Fix variables not updating inside a Panel when the\n preceding Row uses \u0027Repeat For\u0027.\n- Update to version 8.1.3\n + Bug fixes\n * Alerting: Fix alert flapping in the internal alertmanager.\n * Alerting: Fix request handler failed to convert dataframe\n \u0027results\u0027 to plugins.DataTimeSeriesSlice: input frame is not\n recognized as a time series.\n * Dashboard: Fix UIDs are not preserved when importing/creating\n dashboards thru importing .json file.\n * Dashboard: Forces panel re-render when exiting panel edit.\n * Dashboard: Prevent folder from changing when navigating to\n general settings.\n * Docker: Force use of libcrypto1.1 and libssl1.1 versions to\n fix CVE-2021-3711.\n * Elasticsearch: Fix metric names for alert queries.\n * Elasticsearch: Limit Histogram field parameter to numeric\n values.\n * Elasticsearch: Prevent pipeline aggregations to show up in\n terms order by options.\n * LibraryPanels: Prevent duplicate repeated panels from being\n created.\n * Loki: Fix ad-hoc filter in dashboard when used with parser.\n * Plugins: Track signed files + add warn log for plugin assets\n which are not signed.\n * Postgres/MySQL/MSSQL: Fix region annotations not displayed\n correctly.\n * Prometheus: Fix validate selector in metrics browser.\n * Security: Fix stylesheet injection vulnerability.\n * Security: Fix short URL vulnerability.\n- Update to version 8.1.2\n * AzureMonitor: Add support for PostgreSQL and MySQL Flexible\n Servers.\n * Datasource: Change HTTP status code for failed datasource\n health check to 400.\n * Explore: Add span duration to left panel in trace viewer.\n * Plugins: Use file extension allowlist when serving plugin\n assets instead of checking for UNIX executable.\n * Profiling: Add support for binding pprof server to custom\n network interfaces.\n * Search: Make search icon keyboard navigable.\n * Template variables: Keyboard navigation improvements.\n * Tooltip: Display ms within minute time range.\n * Alerting: Fix saving LINE contact point.\n * Annotations: Fix alerting annotation coloring.\n * Annotations: Alert annotations are now visible in the correct\n Panel.\n * Auth: Hide SigV4 config UI and disable middleware when its\n config flag is disabled.\n * Dashboard: Prevent incorrect panel layout by comparing window\n width against theme breakpoints.\n * Explore: Fix showing of full log context.\n * PanelEdit: Fix \u0027Actual\u0027 size by passing the correct panel\n size to Dashboard.\n * Plugins: Fix TLS datasource settings.\n * Variables: Fix issue with empty drop downs on navigation.\n * Variables: Fix URL util converting false into true.\n * Toolkit: Fix matchMedia not found error.\n- Update to version 8.1.1\n * CloudWatch Logs: Fix crash when no region is selected.\n- Update to version 8.1.0\n * Alerting: Deduplicate receivers during migration.\n * ColorPicker: Display colors as RGBA.\n * Select: Make portalling the menu opt-in, but opt-in\n everywhere.\n * TimeRangePicker: Improve accessibility.\n * Annotations: Correct annotations that are displayed upon page\n refresh.\n * Annotations: Fix Enabled button that disappeared from Grafana\n v8.0.6.\n * Annotations: Fix data source template variable that was not\n available for annotations.\n * AzureMonitor: Fix annotations query editor that does not\n load.\n * Geomap: Fix scale calculations.\n * GraphNG: Fix y-axis autosizing.\n * Live: Display stream rate and fix duplicate channels in list\n * Loki: Update labels in log browser when time range changes in\n dashboard.\n * NGAlert: Send resolve signal to alertmanager on alerting -\u003e\n Normal.\n * PasswordField: Prevent a password from being displayed when\n you click the Enter button.\n * Renderer: Remove debug.log file when Grafana is stopped.\n * Security: Update dependencies to fix CVE-2021-36222.\n- Update to version 8.1.0-beta3\n * Alerting: Support label matcher syntax in alert rule list\n filter.\n * IconButton: Put tooltip text as aria-label.\n * Live: Experimental HA with Redis.\n * UI: FileDropzone component.\n * CloudWatch: Add AWS LookoutMetrics.\n * Docker: Fix builds by delaying go mod verify until all\n required files are copied over.\n * Exemplars: Fix disable exemplars only on the query that\n failed.\n * SQL: Fix SQL dataframe resampling (fill mode + time\n intervals).\n- Update to version 8.1.0-beta2\n * Alerting: Expand the value string in alert annotations and\n * Auth: Add Azure HTTP authentication middleware.\n * Auth: Auth: Pass user role when using the authentication\n proxy.\n * Gazetteer: Update countries.json file to allow for linking to\n 3-letter country codes.\n * Config: Fix Docker builds by correcting formatting in\n sample.ini.\n * Explore: Fix encoding of internal URLs.\n- Update to version 8.1.0-beta1\n * Alerting: Add Alertmanager notifications tab.\n * Alerting: Add button to deactivate current Alertmanager\n * Alerting: Add toggle in Loki/Prometheus data source\n configuration to opt out of alerting UI.\n * Alerting: Allow any \u0027evaluate for\u0027 value \u003e=0 in the alert\n rule form.\n * Alerting: Load default configuration from status endpoint, if\n Cortex Alertmanager returns empty user configuration. \n * Alerting: view to display alert rule and its underlying data.\n * Annotation panel: Release the annotation panel.\n * Annotations: Add typeahead support for tags in built-in\n annotations.\n * AzureMonitor: Add curated dashboards for Azure services.\n * AzureMonitor: Add support for deep links to Microsoft Azure\n portal for Metrics.\n * AzureMonitor: Remove support for different credentials for\n Azure Monitor Logs.\n * AzureMonitor: Support querying any Resource for Logs queries.\n * Elasticsearch: Add frozen indices search support.\n * Elasticsearch: Name fields after template variables values\n instead of their name.\n * Elasticsearch: add rate aggregation.\n * Email: Allow configuration of content types for email\n notifications.\n * Explore: Add more meta information when line limit is hit.\n * Explore: UI improvements to trace view.\n * FieldOverrides: Added support to change display name in an\n override field and have it be matched by a later rule.\n * HTTP Client: Introduce dataproxy_max_idle_connections config\n variable.\n * InfluxDB: InfluxQL: adds tags to timeseries data.\n * InfluxDB: InfluxQL: make measurement search case insensitive.\n Legacy Alerting: Replace simplejson with a struct in webhook\n notification channel.\n * Legend: Updates display name for Last (not null) to just\n Last*.\n * Logs panel: Add option to show common labels.\n * Loki: Add $__range variable.\n * Loki: Add support for \u0027label_values(log stream selector,\n label)\u0027 in templating.\n * Loki: Add support for ad-hoc filtering in dashboard.\n * MySQL Datasource: Add timezone parameter.\n * NodeGraph: Show gradient fields in legend.\n * PanelOptions: Don\u0027t mutate panel options/field config object\n when updating.\n * PieChart: Make pie gradient more subtle to match other\n charts.\n * Prometheus: Update PromQL typeahead and highlighting.\n * Prometheus: interpolate variable for step field.\n * Provisioning: Improve validation by validating across all\n dashboard providers.\n * SQL Datasources: Allow multiple string/labels columns with\n time series.\n * Select: Portal select menu to document.body.\n * Team Sync: Add group mapping to support team sync in the\n Generic OAuth provider.\n * Tooltip: Make active series more noticeable.\n * Tracing: Add support to configure trace to logs start and end\n time.\n * Transformations: Skip merge when there is only a single data\n frame.\n * ValueMapping: Added support for mapping text to color,\n boolean values, NaN and Null. Improved UI for value mapping.\n * Visualizations: Dynamically set any config (min, max, unit,\n color, thresholds) from query results.\n * live: Add support to handle origin without a value for the\n port when matching with root_url.\n * Alerting: Handle marshaling Inf values.\n * AzureMonitor: Fix macro resolution for template variables.\n * AzureMonitor: Fix queries with Microsoft.NetApp/../../volumes\n resources.\n * AzureMonitor: Request and concat subsequent resource pages.\n * Bug: Fix parse duration for day.\n * Datasources: Improve error handling for error messages.\n * Explore: Correct the functionality of shift-enter shortcut\n across all uses.\n * Explore: Show all dataFrames in data tab in Inspector.\n * GraphNG: Fix Tooltip mode \u0027All\u0027 for XYChart.\n * Loki: Fix highlight of logs when using filter expressions\n with backticks.\n * Modal: Force modal content to overflow with scroll.\n * Plugins: Ignore symlinked folders when verifying plugin\n signature.\n * Toolkit: Improve error messages when tasks fail.\n- Update to version 8.0.7\n- Update to version 8.0.6\n * Alerting: Add annotation upon alert state change.\n * Alerting: Allow space in label and annotation names.\n * InfluxDB: Improve legend labels for InfluxDB query results.\n * Alerting: Fix improper alert by changing the handling of\n empty labels.\n * CloudWatch/Logs: Reestablish Cloud Watch alert behavior.\n * Dashboard: Avoid migration breaking on fieldConfig without\n defaults field in folded panel.\n * DashboardList: Fix issue not re-fetching dashboard list after\n variable change.\n * Database: Fix incorrect format of isolation level\n configuration parameter for MySQL.\n * InfluxDB: Correct tag filtering on InfluxDB data.\n * Links: Fix links that caused a full page reload.\n * Live: Fix HTTP error when InfluxDB metrics have an incomplete\n or asymmetrical field set.\n * Postgres/MySQL/MSSQL: Change time field to \u0027Time\u0027 for time\n series queries.\n * Postgres: Fix the handling of a null return value in query\n * Tempo: Show hex strings instead of uints for IDs.\n * TimeSeries: Improve tooltip positioning when tooltip\n overflows.\n * Transformations: Add \u0027prepare time series\u0027 transformer.\n- Update to version 8.0.5\n * Cloudwatch Logs: Send error down to client.\n * Folders: Return 409 Conflict status when folder already\n exists.\n * TimeSeries: Do not show series in tooltip if it\u0027s hidden in\n the viz.\n * AzureMonitor: Fix issue where resource group name is missing\n on the resource picker button.\n * Chore: Fix AWS auth assuming role with workspace IAM.\n * DashboardQueryRunner: Fixes unrestrained subscriptions being\n * DateFormats: Fix reading correct setting key for\n use_browser_locale.\n * Links: Fix links to other apps outside Grafana when under sub\n path.\n * Snapshots: Fix snapshot absolute time range issue.\n * Table: Fix data link color.\n * Time Series: Fix X-axis time format when tick increment is\n larger than a year.\n * Tooltip Plugin: Prevent tooltip render if field is undefined.\n- Update to version 8.0.4\n * Live: Rely on app url for origin check.\n * PieChart: Sort legend descending, update placeholder.\n * TimeSeries panel: Do not reinitialize plot when thresholds\n mode change.\n * Elasticsearch: Allow case sensitive custom options in\n date_histogram interval.\n * Elasticsearch: Restore previous field naming strategy when\n using variables.\n * Explore: Fix import of queries between SQL data sources.\n * InfluxDB: InfluxQL query editor: fix retention policy\n handling.\n * Loki: Send correct time range in template variable queries.\n * TimeSeries: Preserve RegExp series overrides when migrating\n from old graph panel.\n- Update to version 8.0.3\n * Alerting: Increase alertmanager_conf column if MySQL.\n * Time series/Bar chart panel: Handle infinite numbers as nulls\n when converting to plot array.\n * TimeSeries: Ensure series overrides that contain color are\n migrated, and migrate the previous fieldConfig when changing\n the panel type.\n * ValueMappings: Improve singlestat value mappings migration.\n * Annotations: Fix annotation line and marker colors.\n * AzureMonitor: Fix KQL template variable queries without\n default workspace.\n * CloudWatch/Logs: Fix missing response data for log queries.\n * LibraryPanels: Fix crash in library panels list when panel\n plugin is not found.\n * LogsPanel: Fix performance drop when moving logs panel in\n * Loki: Parse log levels when ANSI coloring is enabled.\n * MSSQL: Fix issue with hidden queries still being executed.\n * PanelEdit: Display the VisualizationPicker that was not\n displayed if a panel has an unknown panel plugin.\n * Plugins: Fix loading symbolically linked plugins.\n * Prometheus: Fix issue where legend name was replaced with\n name Value in stat and gauge panels.\n * State Timeline: Fix crash when hovering over panel.\n- Update to version 8.0.2\n * Datasource: Add support for max_conns_per_host in dataproxy\n settings.\n * Configuration: Fix changing org preferences in FireFox.\n * PieChart: Fix legend dimension limits.\n * Postgres/MySQL/MSSQL: Fix panic in concurrent map writes.\n * Variables: Hide default data source if missing from regex.\n- Update to version 8.0.1\n * Alerting/SSE: Fix \u0027count_non_null\u0027 reducer validation.\n * Cloudwatch: Fix duplicated time series.\n * Cloudwatch: Fix missing defaultRegion.\n * Dashboard: Fix Dashboard init failed error on dashboards with\n old singlestat panels in collapsed rows.\n * Datasource: Fix storing timeout option as numeric.\n * Postgres/MySQL/MSSQL: Fix annotation parsing for empty\n * Postgres/MySQL/MSSQL: Numeric/non-string values are now\n returned from query variables.\n * Postgres: Fix an error that was thrown when the annotation\n query did not return any results.\n * StatPanel: Fix an issue with the appearance of the graph when\n switching color mode.\n * Visualizations: Fix an issue in the\n Stat/BarGauge/Gauge/PieChart panels where all values mode\n were showing the same name if they had the same value.\n * Toolkit: Resolve external fonts when Grafana is served from a\n sub path.\n- Update to version 8.0.0\n * The following endpoints were deprecated for Grafana v5.0 and\n support for them has now been removed:\n GET /dashboards/db/:slug\n GET /dashboard-solo/db/:slug\n GET /api/dashboard/db/:slug\n DELETE /api/dashboards/db/:slug\n * AzureMonitor: Require default subscription for workspaces()\n template variable query.\n * AzureMonitor: Use resource type display names in the UI.\n * Dashboard: Remove support for loading and deleting dashboard\n by slug.\n * InfluxDB: Deprecate direct browser access in data source.\n * VizLegend: Add a read-only property.\n * AzureMonitor: Fix Azure Resource Graph queries in Azure\n China.\n * Checkbox: Fix vertical layout issue with checkboxes due to\n fixed height.\n * Dashboard: Fix Table view when editing causes the panel data\n to not update.\n * Dashboard: Fix issues where unsaved-changes warning is not\n displayed.\n * Login: Fixes Unauthorized message showing when on login page\n or snapshot page.\n * NodeGraph: Fix sorting markers in grid view.\n * Short URL: Include orgId in generated short URLs.\n * Variables: Support raw values of boolean type.\n- Update to version 8.0.0-beta3\n * The default HTTP method for Prometheus data source is now\n POST.\n * API: Support folder UID in dashboards API.\n * Alerting: Add support for configuring avatar URL for the\n Discord notifier.\n * Alerting: Clarify that Threema Gateway Alerts support only\n Basic IDs.\n * Azure: Expose Azure settings to external plugins.\n * AzureMonitor: Deprecate using separate credentials for Azure\n Monitor Logs.\n * AzureMonitor: Display variables in resource picker for Azure\n * AzureMonitor: Hide application insights for data sources not\n using it.\n * AzureMonitor: Support querying subscriptions and resource\n groups in Azure Monitor Logs.\n * AzureMonitor: remove requirement for default subscription.\n * CloudWatch: Add Lambda@Edge Amazon CloudFront metrics.\n * CloudWatch: Add missing AWS AppSync metrics.\n * ConfirmModal: Auto focus delete button.\n * Explore: Add caching for queries that are run from logs\n * Loki: Add formatting for annotations.\n * Loki: Bring back processed bytes as meta information.\n * NodeGraph: Display node graph collapsed by default with trace\n view.\n * Overrides: Include a manual override option to hide something\n from visualization.\n * PieChart: Support row data in pie charts.\n * Prometheus: Update default HTTP method to POST for existing\n data sources.\n * Time series panel: Position tooltip correctly when window is\n scrolled or resized.\n * Admin: Fix infinite loading edit on the profile page.\n * Color: Fix issues with random colors in string and date\n * Dashboard: Fix issue with title or folder change has no\n effect after exiting settings view.\n * DataLinks: Fix an issue __series.name is not working in data\n link.\n * Datasource: Fix dataproxy timeout should always be applied\n for outgoing data source HTTP requests.\n * Elasticsearch: Fix NewClient not passing httpClientProvider\n to client impl.\n * Explore: Fix Browser title not updated on Navigation to\n Explore.\n * GraphNG: Remove fieldName and hideInLegend properties from\n UPlotSeriesBuilder.\n * OAuth: Fix fallback to auto_assign_org_role setting for Azure\n AD OAuth when no role claims exists.\n * PanelChrome: Fix issue with empty panel after adding a non\n data panel and coming back from panel edit.\n * StatPanel: Fix data link tooltip not showing for single\n value.\n * Table: Fix sorting for number fields.\n * Table: Have text underline for datalink, and add support for\n image datalink.\n * Transformations: Prevent FilterByValue transform from\n crashing panel edit.\n- Update to version 8.0.0-beta2\n * AppPlugins: Expose react-router to apps.\n * AzureMonitor: Add Azure Resource Graph.\n * AzureMonitor: Managed Identity configuration UI.\n * AzureMonitor: Token provider with support for Managed\n Identities.\n * AzureMonitor: Update Logs workspace() template variable query\n to return resource URIs.\n * BarChart: Value label sizing.\n * CloudMonitoring: Add support for preprocessing.\n * CloudWatch: Add AWS/EFS StorageBytes metric.\n * CloudWatch: Allow use of missing AWS namespaces using custom\n * Datasource: Shared HTTP client provider for core backend data\n sources and any data source using the data source proxy.\n * InfluxDB: InfluxQL: allow empty tag values in the query\n editor.\n * Instrumentation: Instrument incoming HTTP request with\n histograms by default.\n * Library Panels: Add name endpoint \u0026 unique name validation to\n AddLibraryPanelModal.\n * Logs panel: Support details view.\n * PieChart: Always show the calculation options dropdown in the\n * PieChart: Remove beta flag.\n * Plugins: Enforce signing for all plugins.\n * Plugins: Remove support for deprecated backend plugin\n protocol version.\n * Tempo/Jaeger: Add better display name to legend.\n * Timeline: Add time range zoom.\n * Timeline: Adds opacity \u0026 line width option.\n * Timeline: Value text alignment option.\n * ValueMappings: Add duplicate action, and disable dismiss on\n backdrop click.\n * Zipkin: Add node graph view to trace response.\n * Annotations panel: Remove subpath from dashboard links.\n * Content Security Policy: Allow all image sources by default.\n * Content Security Policy: Relax default template wrt. loading\n of scripts, due to nonces not working.\n * Datasource: Fix tracing propagation for alert execution by\n introducing HTTP client outgoing tracing middleware.\n * InfluxDB: InfluxQL always apply time interval end.\n * Library Panels: Fixes \u0027error while loading library panels\u0027.\n * NewsPanel: Fixes rendering issue in Safari.\n * PanelChrome: Fix queries being issued again when scrolling in\n and out of view.\n * Plugins: Fix Azure token provider cache panic and auth param\n nil value.\n * Snapshots: Fix key and deleteKey being ignored when creating\n an external snapshot.\n * Table: Fix issue with cell border not showing with colored\n background cells.\n * Table: Makes tooltip scrollable for long JSON values.\n * TimeSeries: Fix for Connected null values threshold toggle\n during panel editing.\n * Variables: Fixes inconsistent selected states on dashboard\n * Variables: Refreshes all panels even if panel is full screen.\n * QueryField: Remove carriage return character from pasted text.\n- Update to version 8.0.0-beta1\n + License update:\n * AGPL License: Update license from Apache 2.0 to the GNU\n Affero General Public License (AGPL).\n * Removes the never refresh option for Query variables.\n * Removes the experimental Tags feature for Variables.\n + Deprecations:\n * The InfoBox \u0026 FeatureInfoBox are now deprecated please use\n the Alert component instead with severity info.\n * API: Add org users with pagination.\n * API: Return 404 when deleting nonexistent API key.\n * API: Return query results as JSON rather than base64 encoded\n Arrow.\n * Alerting: Allow sending notification tags to Opsgenie as\n extra properties.\n * Alerts: Replaces all uses of InfoBox \u0026 FeatureInfoBox with\n Alert.\n * Auth: Add support for JWT Authentication.\n * AzureMonitor: Add support for\n Microsoft.SignalRService/SignalR metrics.\n * AzureMonitor: Azure settings in Grafana server config.\n * AzureMonitor: Migrate Metrics query editor to React.\n * BarChart panel: enable series toggling via legend.\n * BarChart panel: Adds support for Tooltip in BarChartPanel.\n * PieChart panel: Change look of highlighted pie slices.\n * CloudMonitoring: Migrate config editor from angular to react.\n * CloudWatch: Add Amplify Console metrics and dimensions.\n * CloudWatch: Add missing Redshift metrics to CloudWatch data\n * CloudWatch: Add metrics for managed RabbitMQ service.\n * DashboardList: Enable templating on search tag input.\n * Datasource config: correctly remove single custom http\n header.\n * Elasticsearch: Add generic support for template variables.\n * Elasticsearch: Allow omitting field when metric supports\n inline script.\n * Elasticsearch: Allow setting a custom limit for log queries.\n * Elasticsearch: Guess field type from first non-empty value.\n * Elasticsearch: Use application/x-ndjson content type for\n multisearch requests.\n * Elasticsearch: Use semver strings to identify ES version.\n * Explore: Add logs navigation to request more logs.\n * Explore: Map Graphite queries to Loki.\n * Explore: Scroll split panes in Explore independently.\n * Explore: Wrap each panel in separate error boundary.\n * FieldDisplay: Smarter naming of stat values when visualising\n row values (all values) in stat panels.\n * Graphite: Expand metric names for variables.\n * Graphite: Handle unknown Graphite functions without breaking\n the visual editor.\n * Graphite: Show graphite functions descriptions.\n * Graphite: Support request cancellation properly (Uses new\n backendSrv.fetch Observable request API).\n * InfluxDB: Flux: Improve handling of complex\n response-structures.\n * InfluxDB: Support region annotations.\n * Inspector: Download logs for manual processing.\n * Jaeger: Add node graph view for trace.\n * Jaeger: Search traces.\n * Loki: Use data source settings for alerting queries.\n * NodeGraph: Exploration mode.\n * OAuth: Add support for empty scopes.\n * PanelChrome: New logic-less emotion based component with no\n dependency on PanelModel or DashboardModel.\n * PanelEdit: Adds a table view toggle to quickly view data in\n table form.\n * PanelEdit: Highlight matched words when searching options.\n * PanelEdit: UX improvements.\n * Plugins: PanelRenderer and simplified QueryRunner to be used\n from plugins.\n * Plugins: AuthType in route configuration and params\n interpolation.\n * Plugins: Enable plugin runtime install/uninstall\n capabilities.\n * Plugins: Support set body content in plugin routes.\n * Plugins: Introduce marketplace app.\n * Plugins: Moving the DataSourcePicker to grafana/runtime so it\n can be reused in plugins.\n * Prometheus: Add custom query params for alert and exemplars\n * Prometheus: Use fuzzy string matching to autocomplete metric\n names and label.\n * Routing: Replace Angular routing with react-router.\n * Slack: Use chat.postMessage API by default.\n * Tempo: Search for Traces by querying Loki directly from\n Tempo.\n * Tempo: Show graph view of the trace.\n * Themes: Switch theme without reload using global shortcut.\n * TimeSeries panel: Add support for shared cursor.\n * TimeSeries panel: Do not crash the panel if there is no time\n series data in the response.\n * Variables: Do not save repeated panels, rows and scopedVars.\n * Variables: Removes experimental Tags feature.\n * Variables: Removes the never refresh option.\n * Visualizations: Unify tooltip options across visualizations.\n * Visualizations: Refactor and unify option creation between\n new visualizations.\n * Visualizations: Remove singlestat panel.\n * APIKeys: Fixes issue with adding first api key.\n * Alerting: Add checks for non supported units - disable\n defaulting to seconds.\n * Alerting: Fix issue where Slack notifications won\u0027t link to\n user IDs.\n * Alerting: Omit empty message in PagerDuty notifier.\n * AzureMonitor: Fix migration error from older versions of App\n Insights queries.\n * CloudWatch: Fix AWS/Connect dimensions.\n * CloudWatch: Fix broken AWS/MediaTailor dimension name.\n * Dashboards: Allow string manipulation as advanced variable\n format option.\n * DataLinks: Includes harmless extended characters like\n Cyrillic characters.\n * Drawer: Fixes title overflowing its container.\n * Explore: Fix issue when some query errors were not shown.\n * Generic OAuth: Prevent adding duplicated users.\n * Graphite: Handle invalid annotations.\n * Graphite: Fix autocomplete when tags are not available.\n * InfluxDB: Fix Cannot read property \u0027length\u0027 of undefined in\n when parsing response.\n * Instrumentation: Enable tracing when Jaeger host and port are\n * Instrumentation: Prefix metrics with grafana.\n * MSSQL: By default let driver choose port.\n * OAuth: Add optional strict parsing of role_attribute_path.\n * Panel: Fixes description markdown with inline code being\n rendered on newlines and full width.\n * PanelChrome: Ignore data updates \u0026 errors for non data\n panels.\n * Permissions: Fix inherited folder permissions can prevent new\n permissions being added to a dashboard.\n * Plugins: Remove pre-existing plugin installs when installing\n with grafana-cli.\n * Plugins: Support installing to folders with whitespace and\n fix pluginUrl trailing and leading whitespace failures.\n * Postgres/MySQL/MSSQL: Don\u0027t return connection failure details\n to the client.\n * Postgres: Fix ms precision of interval in time group macro\n when TimescaleDB is enabled.\n * Provisioning: Use dashboard checksum field as change\n indicator.\n * SQL: Fix so that all captured errors are returned from sql\n engine.\n * Shortcuts: Fixes panel shortcuts so they always work.\n * Table: Fixes so border is visible for cells with links.\n * Variables: Clear query when data source type changes.\n * Variables: Filters out builtin variables from unknown list.\n * Button: Introduce buttonStyle prop.\n * DataQueryRequest: Remove deprecated props showingGraph and\n showingTabel and exploreMode.\n * grafana/ui: Update React Hook Form to v7.\n * IconButton: Introduce variant for red and blue icon buttons.\n * Plugins: Expose the getTimeZone function to be able to get\n the current selected timeZone.\n * TagsInput: Add className to TagsInput.\n * VizLegend: Move onSeriesColorChanged to PanelContext\n (breaking change).\n- Update to version 7.5.13\n * Alerting: Fix NoDataFound for alert rules using AND operator.\n\nmgr-cfg:\n\n- Version 4.2.8-1\n * Fix the condition for preventing building python 2 subpackage\n for SLE15 (bsc#1197579)\n- Version 4.2.7-1\n * Fix installation problem for SLE15SP4 due missing python-selinux\n\nmgr-osad:\n\n- Version 4.2.8-1\n * Fix the condition for preventing building python 2 subpackage\n for SLE15\n\nmgr-push:\n\n- Version 4.2.5-1\n * Fix the condition for preventing building python 2 subpackage\n for SLE15\n\nmgr-virtualization:\n\n- Version 4.2.4-1\n * Fix the condition for preventing building python 2 subpackage\n for SLE15\n\nprometheus-postgres_exporter:\n\n- Version 0.10.0\n * Added hardening to systemd service(s) with changes to `prometheus-postgres_exporter.service` (bsc#1181400)\n * Package rename from golang-github-wrouesnel-postgres_exporter (jsc#SLE-23051)\n\nrhnlib:\n\n- Version 4.2.6-1\n * Fix the condition for preventing building python 2 subpackage\n for SLE15\n\nspacecmd:\n\n- Version 4.2.16-1\n * implement system.bootstrap (bsc#1194909)\n * Fix interactive mode for \u0027system_applyerrata\u0027 and \u0027errata_apply\u0027 (bsc#1194363)\n\nspacewalk-client-tools:\n\n- Version 4.2.18-1\n * Fix the condition for preventing building python 2 subpackage\n for SLE15\n- Version 4.2.17-1\n * Update translation strings\n\nspacewalk-koan:\n\n- Version 4.2.6-1\n * Fix the condition for preventing building python 2 subpackage\n for SLE15\n\nspacewalk-oscap:\n\n- Version 4.2.4-1\n * Fix the condition for preventing building python 2 subpackage\n for SLE15\n\nsuseRegisterInfo:\n\n- Version 4.2.6-1\n * Fix the condition for preventing building python 2 subpackage\n for SLE15\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-1396,SUSE-SLE-Manager-Tools-15-2022-1396,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-1396,openSUSE-SLE-15.3-2022-1396,openSUSE-SLE-15.4-2022-1396", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1396-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:1396-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221396-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:1396-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010822.html" }, { "category": "self", "summary": "SUSE Bug 1181400", "url": "https://bugzilla.suse.com/1181400" }, { "category": "self", "summary": "SUSE Bug 1194363", "url": "https://bugzilla.suse.com/1194363" }, { "category": "self", "summary": "SUSE Bug 1194873", "url": "https://bugzilla.suse.com/1194873" }, { "category": "self", "summary": "SUSE Bug 1194909", "url": "https://bugzilla.suse.com/1194909" }, { "category": "self", "summary": "SUSE Bug 1195726", "url": "https://bugzilla.suse.com/1195726" }, { "category": "self", "summary": "SUSE Bug 1195727", "url": "https://bugzilla.suse.com/1195727" }, { "category": "self", "summary": "SUSE Bug 1195728", "url": "https://bugzilla.suse.com/1195728" }, { "category": "self", "summary": "SUSE Bug 1197579", "url": "https://bugzilla.suse.com/1197579" }, { "category": "self", "summary": "SUSE CVE CVE-2021-36222 page", "url": "https://www.suse.com/security/cve/CVE-2021-36222/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3711 page", "url": "https://www.suse.com/security/cve/CVE-2021-3711/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39226 page", "url": "https://www.suse.com/security/cve/CVE-2021-39226/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41174 page", "url": "https://www.suse.com/security/cve/CVE-2021-41174/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41244 page", "url": "https://www.suse.com/security/cve/CVE-2021-41244/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43798 page", "url": "https://www.suse.com/security/cve/CVE-2021-43798/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43813 page", "url": "https://www.suse.com/security/cve/CVE-2021-43813/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43815 page", "url": "https://www.suse.com/security/cve/CVE-2021-43815/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21673 page", "url": "https://www.suse.com/security/cve/CVE-2022-21673/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21702 page", "url": "https://www.suse.com/security/cve/CVE-2022-21702/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21703 page", "url": "https://www.suse.com/security/cve/CVE-2022-21703/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21713 page", "url": "https://www.suse.com/security/cve/CVE-2022-21713/" } ], "title": "Security update for SUSE Manager Client Tools", "tracking": { "current_release_date": "2022-04-25T14:43:36Z", "generator": { "date": "2022-04-25T14:43:36Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:1396-1", "initial_release_date": "2022-04-25T14:43:36Z", "revision_history": [ { "date": "2022-04-25T14:43:36Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "grafana-8.3.5-150000.1.30.1.aarch64", "product": { "name": "grafana-8.3.5-150000.1.30.1.aarch64", "product_id": "grafana-8.3.5-150000.1.30.1.aarch64" } }, { "category": "product_version", "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "product": { "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "product_id": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64" } }, { "category": "product_version", "name": "uyuni-base-common-4.2.3-150000.1.6.1.aarch64", "product": { "name": "uyuni-base-common-4.2.3-150000.1.6.1.aarch64", "product_id": "uyuni-base-common-4.2.3-150000.1.6.1.aarch64" } }, { "category": "product_version", "name": "uyuni-base-proxy-4.2.3-150000.1.6.1.aarch64", "product": { "name": "uyuni-base-proxy-4.2.3-150000.1.6.1.aarch64", "product_id": "uyuni-base-proxy-4.2.3-150000.1.6.1.aarch64" } }, { "category": "product_version", "name": "uyuni-base-server-4.2.3-150000.1.6.1.aarch64", "product": { "name": "uyuni-base-server-4.2.3-150000.1.6.1.aarch64", "product_id": "uyuni-base-server-4.2.3-150000.1.6.1.aarch64" } }, { "category": "product_version", "name": "wire-0.5.0-150000.1.3.1.aarch64", "product": { "name": "wire-0.5.0-150000.1.3.1.aarch64", "product_id": "wire-0.5.0-150000.1.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "grafana-8.3.5-150000.1.30.1.i586", "product": { "name": "grafana-8.3.5-150000.1.30.1.i586", "product_id": "grafana-8.3.5-150000.1.30.1.i586" } }, { "category": "product_version", "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.i586", "product": { "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.i586", "product_id": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.i586" } }, { "category": "product_version", "name": "uyuni-base-common-4.2.3-150000.1.6.1.i586", "product": { "name": "uyuni-base-common-4.2.3-150000.1.6.1.i586", "product_id": "uyuni-base-common-4.2.3-150000.1.6.1.i586" } }, { "category": "product_version", "name": "uyuni-base-proxy-4.2.3-150000.1.6.1.i586", "product": { "name": "uyuni-base-proxy-4.2.3-150000.1.6.1.i586", "product_id": "uyuni-base-proxy-4.2.3-150000.1.6.1.i586" } }, { "category": "product_version", "name": "uyuni-base-server-4.2.3-150000.1.6.1.i586", "product": { "name": "uyuni-base-server-4.2.3-150000.1.6.1.i586", "product_id": "uyuni-base-server-4.2.3-150000.1.6.1.i586" } }, { "category": "product_version", "name": "wire-0.5.0-150000.1.3.1.i586", "product": { "name": "wire-0.5.0-150000.1.3.1.i586", "product_id": "wire-0.5.0-150000.1.3.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "mgr-cfg-4.2.8-150000.1.24.1.noarch", "product": { "name": "mgr-cfg-4.2.8-150000.1.24.1.noarch", "product_id": "mgr-cfg-4.2.8-150000.1.24.1.noarch" } }, { "category": "product_version", "name": "mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "product": { "name": "mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "product_id": "mgr-cfg-actions-4.2.8-150000.1.24.1.noarch" } }, { "category": "product_version", "name": "mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "product": { "name": "mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "product_id": "mgr-cfg-client-4.2.8-150000.1.24.1.noarch" } }, { "category": "product_version", "name": "mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "product": { "name": "mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "product_id": "mgr-cfg-management-4.2.8-150000.1.24.1.noarch" } }, { "category": "product_version", "name": "mgr-osa-dispatcher-4.2.8-150000.1.36.1.noarch", "product": { "name": "mgr-osa-dispatcher-4.2.8-150000.1.36.1.noarch", "product_id": "mgr-osa-dispatcher-4.2.8-150000.1.36.1.noarch" } }, { "category": "product_version", "name": "mgr-osad-4.2.8-150000.1.36.1.noarch", "product": { "name": "mgr-osad-4.2.8-150000.1.36.1.noarch", "product_id": "mgr-osad-4.2.8-150000.1.36.1.noarch" } }, { "category": "product_version", "name": "mgr-push-4.2.5-150000.1.18.2.noarch", "product": { "name": "mgr-push-4.2.5-150000.1.18.2.noarch", "product_id": "mgr-push-4.2.5-150000.1.18.2.noarch" } }, { "category": "product_version", "name": "mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "product": { "name": "mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "product_id": "mgr-virtualization-host-4.2.4-150000.1.26.1.noarch" } }, { "category": "product_version", "name": "python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "product": { "name": "python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "product_id": "python3-mgr-cfg-4.2.8-150000.1.24.1.noarch" } }, { "category": "product_version", "name": "python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "product": { "name": "python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "product_id": "python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch" } }, { "category": "product_version", "name": "python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "product": { "name": "python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "product_id": "python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch" } }, { "category": "product_version", "name": "python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "product": { "name": "python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "product_id": "python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch" } }, { "category": "product_version", "name": "python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "product": { "name": "python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "product_id": "python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch" } }, { "category": "product_version", "name": "python3-mgr-osa-dispatcher-4.2.8-150000.1.36.1.noarch", "product": { "name": "python3-mgr-osa-dispatcher-4.2.8-150000.1.36.1.noarch", "product_id": "python3-mgr-osa-dispatcher-4.2.8-150000.1.36.1.noarch" } }, { "category": "product_version", "name": "python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "product": { "name": "python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "product_id": "python3-mgr-osad-4.2.8-150000.1.36.1.noarch" } }, { "category": "product_version", "name": "python3-mgr-push-4.2.5-150000.1.18.2.noarch", "product": { "name": "python3-mgr-push-4.2.5-150000.1.18.2.noarch", "product_id": "python3-mgr-push-4.2.5-150000.1.18.2.noarch" } }, { "category": "product_version", "name": "python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "product": { "name": "python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "product_id": "python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch" } }, { "category": "product_version", "name": "python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "product": { "name": "python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "product_id": "python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch" } }, { "category": "product_version", "name": "python3-rhnlib-4.2.6-150000.3.34.1.noarch", "product": { "name": "python3-rhnlib-4.2.6-150000.3.34.1.noarch", "product_id": "python3-rhnlib-4.2.6-150000.3.34.1.noarch" } }, { "category": "product_version", "name": "python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "product": { "name": "python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "product_id": "python3-spacewalk-check-4.2.18-150000.3.59.1.noarch" } }, { "category": "product_version", "name": "python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "product": { "name": "python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "product_id": "python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch" } }, { "category": "product_version", "name": "python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "product": { "name": "python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "product_id": "python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch" } }, { "category": "product_version", "name": "python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "product": { "name": "python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "product_id": "python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch" } }, { "category": "product_version", "name": "python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "product": { "name": "python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "product_id": "python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch" } }, { "category": "product_version", "name": "python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "product": { "name": "python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "product_id": "python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch" } }, { "category": "product_version", "name": "spacecmd-4.2.16-150000.3.77.1.noarch", "product": { "name": "spacecmd-4.2.16-150000.3.77.1.noarch", "product_id": "spacecmd-4.2.16-150000.3.77.1.noarch" } }, { "category": "product_version", "name": "spacewalk-check-4.2.18-150000.3.59.1.noarch", "product": { "name": "spacewalk-check-4.2.18-150000.3.59.1.noarch", "product_id": "spacewalk-check-4.2.18-150000.3.59.1.noarch" } }, { "category": "product_version", "name": "spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "product": { "name": "spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "product_id": "spacewalk-client-setup-4.2.18-150000.3.59.1.noarch" } }, { "category": "product_version", "name": "spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "product": { "name": "spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "product_id": "spacewalk-client-tools-4.2.18-150000.3.59.1.noarch" } }, { "category": "product_version", "name": "spacewalk-koan-4.2.6-150000.3.27.1.noarch", "product": { "name": "spacewalk-koan-4.2.6-150000.3.27.1.noarch", "product_id": "spacewalk-koan-4.2.6-150000.3.27.1.noarch" } }, { "category": "product_version", "name": "spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "product": { "name": "spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "product_id": "spacewalk-oscap-4.2.4-150000.3.18.1.noarch" } }, { "category": "product_version", "name": "suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "product": { "name": "suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "product_id": "suseRegisterInfo-4.2.6-150000.3.21.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "grafana-8.3.5-150000.1.30.1.ppc64le", "product": { "name": "grafana-8.3.5-150000.1.30.1.ppc64le", "product_id": "grafana-8.3.5-150000.1.30.1.ppc64le" } }, { "category": "product_version", "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "product": { "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "product_id": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le" } }, { "category": "product_version", "name": "uyuni-base-common-4.2.3-150000.1.6.1.ppc64le", "product": { "name": "uyuni-base-common-4.2.3-150000.1.6.1.ppc64le", "product_id": "uyuni-base-common-4.2.3-150000.1.6.1.ppc64le" } }, { "category": "product_version", "name": "uyuni-base-proxy-4.2.3-150000.1.6.1.ppc64le", "product": { "name": "uyuni-base-proxy-4.2.3-150000.1.6.1.ppc64le", "product_id": "uyuni-base-proxy-4.2.3-150000.1.6.1.ppc64le" } }, { "category": "product_version", "name": "uyuni-base-server-4.2.3-150000.1.6.1.ppc64le", "product": { "name": "uyuni-base-server-4.2.3-150000.1.6.1.ppc64le", "product_id": "uyuni-base-server-4.2.3-150000.1.6.1.ppc64le" } }, { "category": "product_version", "name": "wire-0.5.0-150000.1.3.1.ppc64le", "product": { "name": "wire-0.5.0-150000.1.3.1.ppc64le", "product_id": "wire-0.5.0-150000.1.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "grafana-8.3.5-150000.1.30.1.s390x", "product": { "name": "grafana-8.3.5-150000.1.30.1.s390x", "product_id": "grafana-8.3.5-150000.1.30.1.s390x" } }, { "category": "product_version", "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "product": { "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "product_id": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x" } }, { "category": "product_version", "name": "uyuni-base-common-4.2.3-150000.1.6.1.s390x", "product": { "name": "uyuni-base-common-4.2.3-150000.1.6.1.s390x", "product_id": "uyuni-base-common-4.2.3-150000.1.6.1.s390x" } }, { "category": "product_version", "name": "uyuni-base-proxy-4.2.3-150000.1.6.1.s390x", "product": { "name": "uyuni-base-proxy-4.2.3-150000.1.6.1.s390x", "product_id": "uyuni-base-proxy-4.2.3-150000.1.6.1.s390x" } }, { "category": "product_version", "name": "uyuni-base-server-4.2.3-150000.1.6.1.s390x", "product": { "name": "uyuni-base-server-4.2.3-150000.1.6.1.s390x", "product_id": "uyuni-base-server-4.2.3-150000.1.6.1.s390x" } }, { "category": "product_version", "name": "wire-0.5.0-150000.1.3.1.s390x", "product": { "name": "wire-0.5.0-150000.1.3.1.s390x", "product_id": "wire-0.5.0-150000.1.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "grafana-8.3.5-150000.1.30.1.x86_64", "product": { "name": "grafana-8.3.5-150000.1.30.1.x86_64", "product_id": "grafana-8.3.5-150000.1.30.1.x86_64" } }, { "category": "product_version", "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "product": { "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "product_id": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64" } }, { "category": "product_version", "name": "uyuni-base-common-4.2.3-150000.1.6.1.x86_64", "product": { "name": "uyuni-base-common-4.2.3-150000.1.6.1.x86_64", "product_id": "uyuni-base-common-4.2.3-150000.1.6.1.x86_64" } }, { "category": "product_version", "name": "uyuni-base-proxy-4.2.3-150000.1.6.1.x86_64", "product": { "name": "uyuni-base-proxy-4.2.3-150000.1.6.1.x86_64", "product_id": "uyuni-base-proxy-4.2.3-150000.1.6.1.x86_64" } }, { "category": "product_version", "name": "uyuni-base-server-4.2.3-150000.1.6.1.x86_64", "product": { "name": "uyuni-base-server-4.2.3-150000.1.6.1.x86_64", "product_id": "uyuni-base-server-4.2.3-150000.1.6.1.x86_64" } }, { "category": "product_version", "name": "wire-0.5.0-150000.1.3.1.x86_64", "product": { "name": "wire-0.5.0-150000.1.3.1.x86_64", "product_id": "wire-0.5.0-150000.1.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Manager Client Tools 15", "product": { "name": "SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15" } }, { "category": "product_name", "name": "SUSE Manager Server Module 4.2", "product": { "name": "SUSE Manager Server Module 4.2", "product_id": "SUSE Manager Server Module 4.2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-suse-manager-server:4.2" } } }, { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "grafana-8.3.5-150000.1.30.1.aarch64 as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64" }, "product_reference": "grafana-8.3.5-150000.1.30.1.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.3.5-150000.1.30.1.ppc64le as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le" }, "product_reference": "grafana-8.3.5-150000.1.30.1.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.3.5-150000.1.30.1.s390x as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x" }, "product_reference": "grafana-8.3.5-150000.1.30.1.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.3.5-150000.1.30.1.x86_64 as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64" }, "product_reference": "grafana-8.3.5-150000.1.30.1.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "mgr-cfg-4.2.8-150000.1.24.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch" }, "product_reference": "mgr-cfg-4.2.8-150000.1.24.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "mgr-cfg-actions-4.2.8-150000.1.24.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch" }, "product_reference": "mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "mgr-cfg-client-4.2.8-150000.1.24.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch" }, "product_reference": "mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "mgr-cfg-management-4.2.8-150000.1.24.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch" }, "product_reference": "mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "mgr-osad-4.2.8-150000.1.36.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch" }, "product_reference": "mgr-osad-4.2.8-150000.1.36.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "mgr-push-4.2.5-150000.1.18.2.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch" }, "product_reference": "mgr-push-4.2.5-150000.1.18.2.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "mgr-virtualization-host-4.2.4-150000.1.26.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch" }, "product_reference": "mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64 as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64" }, "product_reference": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le" }, "product_reference": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x" }, "product_reference": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64 as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64" }, "product_reference": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "python3-mgr-cfg-4.2.8-150000.1.24.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch" }, "product_reference": "python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch" }, "product_reference": "python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch" }, "product_reference": "python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch" }, "product_reference": "python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch" }, "product_reference": "python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "python3-mgr-osad-4.2.8-150000.1.36.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch" }, "product_reference": "python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "python3-mgr-push-4.2.5-150000.1.18.2.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch" }, "product_reference": "python3-mgr-push-4.2.5-150000.1.18.2.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch" }, "product_reference": "python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch" }, "product_reference": "python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rhnlib-4.2.6-150000.3.34.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch" }, "product_reference": "python3-rhnlib-4.2.6-150000.3.34.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "python3-spacewalk-check-4.2.18-150000.3.59.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch" }, "product_reference": "python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch" }, "product_reference": "python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch" }, "product_reference": "python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch" }, "product_reference": "python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch" }, "product_reference": "python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch" }, "product_reference": "python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "spacecmd-4.2.16-150000.3.77.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch" }, "product_reference": "spacecmd-4.2.16-150000.3.77.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-check-4.2.18-150000.3.59.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch" }, "product_reference": "spacewalk-check-4.2.18-150000.3.59.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-client-setup-4.2.18-150000.3.59.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch" }, "product_reference": "spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-client-tools-4.2.18-150000.3.59.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch" }, "product_reference": "spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-koan-4.2.6-150000.3.27.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch" }, "product_reference": "spacewalk-koan-4.2.6-150000.3.27.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-oscap-4.2.4-150000.3.18.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch" }, "product_reference": "spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "suseRegisterInfo-4.2.6-150000.3.21.1.noarch as component of SUSE Manager Client Tools 15", "product_id": "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch" }, "product_reference": "suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "relates_to_product_reference": "SUSE Manager Client Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64 as component of SUSE Manager Server Module 4.2", "product_id": "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64" }, "product_reference": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Manager Server Module 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le as component of SUSE Manager Server Module 4.2", "product_id": "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le" }, "product_reference": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server Module 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x as component of SUSE Manager Server Module 4.2", "product_id": "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x" }, "product_reference": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "relates_to_product_reference": "SUSE Manager Server Module 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64 as component of SUSE Manager Server Module 4.2", "product_id": "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64" }, "product_reference": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Manager Server Module 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64" }, "product_reference": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le" }, "product_reference": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x" }, "product_reference": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64" }, "product_reference": "prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rhnlib-4.2.6-150000.3.34.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch" }, "product_reference": "python3-rhnlib-4.2.6-150000.3.34.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "spacecmd-4.2.16-150000.3.77.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" }, "product_reference": "spacecmd-4.2.16-150000.3.77.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-36222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-36222" } ], "notes": [ { "category": "general", "text": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-36222", "url": "https://www.suse.com/security/cve/CVE-2021-36222" }, { "category": "external", "summary": "SUSE Bug 1188571 for CVE-2021-36222", "url": "https://bugzilla.suse.com/1188571" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T14:43:36Z", "details": "important" } ], "title": "CVE-2021-36222" }, { "cve": "CVE-2021-3711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3711" } ], "notes": [ { "category": "general", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3711", "url": "https://www.suse.com/security/cve/CVE-2021-3711" }, { "category": "external", "summary": "SUSE Bug 1189520 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1189520" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1205663 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1205663" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T14:43:36Z", "details": "critical" } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2021-39226", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39226" } ], "notes": [ { "category": "general", "text": "Grafana is an open source data visualization platform. In affected versions unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: /dashboard/snapshot/:key, or /api/snapshots/:key. If the snapshot \"public_mode\" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: /api/snapshots-delete/:deleteKey. Regardless of the snapshot \"public_mode\" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: /api/snapshots/:key, or /api/snapshots-delete/:deleteKey. The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss. This issue has been resolved in versions 8.1.6 and 7.5.11. If for some reason you cannot upgrade you can use a reverse proxy or similar to block access to the literal paths: /api/snapshots/:key, /api/snapshots-delete/:deleteKey, /dashboard/snapshot/:key, and /api/snapshots/:key. They have no normal function and can be disabled without side effects.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39226", "url": "https://www.suse.com/security/cve/CVE-2021-39226" }, { "category": "external", "summary": "SUSE Bug 1191454 for CVE-2021-39226", "url": "https://bugzilla.suse.com/1191454" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T14:43:36Z", "details": "important" } ], "title": "CVE-2021-39226" }, { "cve": "CVE-2021-41174", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41174" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions if an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim\u0027s browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} ex: {{constructor.constructor(\u0027alert(1)\u0027)()}}. When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. Users are advised to upgrade as soon as possible. If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string {{ in the path.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41174", "url": "https://www.suse.com/security/cve/CVE-2021-41174" }, { "category": "external", "summary": "SUSE Bug 1192383 for CVE-2021-41174", "url": "https://bugzilla.suse.com/1192383" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T14:43:36Z", "details": "moderate" } ], "title": "CVE-2021-41174" }, { "cve": "CVE-2021-41244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41244" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions when the fine-grained access control beta feature is enabled and there is more than one organization in the Grafana instance admins are able to access users from other organizations. Grafana 8.0 introduced a mechanism which allowed users with the Organization Admin role to list, add, remove, and update users\u0027 roles in other organizations in which they are not an admin. With fine-grained access control enabled, organization admins can list, add, remove and update users\u0027 roles in another organization, where they do not have organization admin role. All installations between v8.0 and v8.2.3 that have fine-grained access control beta enabled and more than one organization should be upgraded as soon as possible. If you cannot upgrade, you should turn off the fine-grained access control using a feature flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41244", "url": "https://www.suse.com/security/cve/CVE-2021-41244" }, { "category": "external", "summary": "SUSE Bug 1192763 for CVE-2021-41244", "url": "https://bugzilla.suse.com/1192763" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T14:43:36Z", "details": "critical" } ], "title": "CVE-2021-41244" }, { "cve": "CVE-2021-43798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43798" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `\u003cgrafana_host_url\u003e/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43798", "url": "https://www.suse.com/security/cve/CVE-2021-43798" }, { "category": "external", "summary": "SUSE Bug 1193492 for CVE-2021-43798", "url": "https://bugzilla.suse.com/1193492" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T14:43:36Z", "details": "important" } ], "title": "CVE-2021-43798" }, { "cve": "CVE-2021-43813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43813" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 contains a directory traversal vulnerability for fully lowercase or fully uppercase .md files. The vulnerability is limited in scope, and only allows access to files with the extension .md to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Users should upgrade to patched versions 8.3.2 or 7.5.12. For users who cannot upgrade, running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths. Alternatively, for fully lowercase or fully uppercase .md files, users can block /api/plugins/.*/markdown/.* without losing any functionality beyond inlined plugin help text.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43813", "url": "https://www.suse.com/security/cve/CVE-2021-43813" }, { "category": "external", "summary": "SUSE Bug 1193686 for CVE-2021-43813", "url": "https://bugzilla.suse.com/1193686" }, { "category": "external", "summary": "SUSE Bug 1193688 for CVE-2021-43813", "url": "https://bugzilla.suse.com/1193688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T14:43:36Z", "details": "moderate" } ], "title": "CVE-2021-43813" }, { "cve": "CVE-2021-43815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43815" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 has a directory traversal for arbitrary .csv files. It only affects instances that have the developer testing tool called TestData DB data source enabled and configured. The vulnerability is limited in scope, and only allows access to files with the extension .csv to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Versions 8.3.2 and 7.5.12 contain a patch for this issue. There is a workaround available for users who cannot upgrade. Running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43815", "url": "https://www.suse.com/security/cve/CVE-2021-43815" }, { "category": "external", "summary": "SUSE Bug 1193686 for CVE-2021-43815", "url": "https://bugzilla.suse.com/1193686" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T14:43:36Z", "details": "moderate" } ], "title": "CVE-2021-43815" }, { "cve": "CVE-2022-21673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21673" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions when a data source has the Forward OAuth Identity feature enabled, sending a query to that datasource with an API token (and no other user credentials) will forward the OAuth Identity of the most recently logged-in user. This can allow API token holders to retrieve data for which they may not have intended access. This attack relies on the Grafana instance having data sources that support the Forward OAuth Identity feature, the Grafana instance having a data source with the Forward OAuth Identity feature toggled on, the Grafana instance having OAuth enabled, and the Grafana instance having usable API keys. This issue has been patched in versions 7.5.13 and 8.3.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21673", "url": "https://www.suse.com/security/cve/CVE-2022-21673" }, { "category": "external", "summary": "SUSE Bug 1194873 for CVE-2022-21673", "url": "https://bugzilla.suse.com/1194873" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T14:43:36Z", "details": "moderate" } ], "title": "CVE-2022-21673" }, { "cve": "CVE-2022-21702", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21702" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site Scripting (XSS) attack. The attacker could either compromise an existing datasource for a specific Grafana instance or either set up its own public service and instruct anyone to set it up in their Grafana instance. To be impacted, all of the following must be applicable. For the data source proxy: A Grafana HTTP-based datasource configured with Server as Access Mode and a URL set, the attacker has to be in control of the HTTP server serving the URL of above datasource, and a specially crafted link pointing at the attacker controlled data source must be clicked on by an authenticated user. For the plugin proxy: A Grafana HTTP-based app plugin configured and enabled with a URL set, the attacker has to be in control of the HTTP server serving the URL of above app, and a specially crafted link pointing at the attacker controlled plugin must be clocked on by an authenticated user. For the backend plugin resource: An attacker must be able to navigate an authenticated user to a compromised plugin through a crafted link. Users are advised to update to a patched version. There are no known workarounds for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21702", "url": "https://www.suse.com/security/cve/CVE-2022-21702" }, { "category": "external", "summary": "SUSE Bug 1195726 for CVE-2022-21702", "url": "https://bugzilla.suse.com/1195726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T14:43:36Z", "details": "moderate" } ], "title": "CVE-2022-21702" }, { "cve": "CVE-2022-21703", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21703" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21703", "url": "https://www.suse.com/security/cve/CVE-2022-21703" }, { "category": "external", "summary": "SUSE Bug 1195727 for CVE-2022-21703", "url": "https://bugzilla.suse.com/1195727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T14:43:36Z", "details": "moderate" } ], "title": "CVE-2022-21703" }, { "cve": "CVE-2022-21713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21713" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Affected versions of Grafana expose multiple API endpoints which do not properly handle user authorization. `/teams/:teamId` will allow an authenticated attacker to view unintended data by querying for the specific team ID, `/teams/:search` will allow an authenticated attacker to search for teams and see the total number of available teams, including for those teams that the user does not have access to, and `/teams/:teamId/members` when editors_can_admin flag is enabled, an authenticated attacker can see unintended data by querying for the specific team ID. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21713", "url": "https://www.suse.com/security/cve/CVE-2022-21713" }, { "category": "external", "summary": "SUSE Bug 1195728 for CVE-2022-21713", "url": "https://bugzilla.suse.com/1195728" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.aarch64", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.ppc64le", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.s390x", "SUSE Manager Client Tools 15:grafana-8.3.5-150000.1.30.1.x86_64", "SUSE Manager Client Tools 15:mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Client Tools 15:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "SUSE Manager Client Tools 15:python3-mgr-cfg-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-actions-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-client-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-cfg-management-4.2.8-150000.1.24.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osa-common-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-osad-4.2.8-150000.1.36.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-push-4.2.5-150000.1.18.2.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-common-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-mgr-virtualization-host-4.2.4-150000.1.26.1.noarch", "SUSE Manager Client Tools 15:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:python3-spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:python3-suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Client Tools 15:spacecmd-4.2.16-150000.3.77.1.noarch", "SUSE Manager Client Tools 15:spacewalk-check-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-setup-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-client-tools-4.2.18-150000.3.59.1.noarch", "SUSE Manager Client Tools 15:spacewalk-koan-4.2.6-150000.3.27.1.noarch", "SUSE Manager Client Tools 15:spacewalk-oscap-4.2.4-150000.3.18.1.noarch", "SUSE Manager Client Tools 15:suseRegisterInfo-4.2.6-150000.3.21.1.noarch", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "SUSE Manager Server Module 4.2:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.aarch64", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.ppc64le", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.s390x", "openSUSE Leap 15.3:prometheus-postgres_exporter-0.10.0-150000.1.3.1.x86_64", "openSUSE Leap 15.3:python3-rhnlib-4.2.6-150000.3.34.1.noarch", "openSUSE Leap 15.3:spacecmd-4.2.16-150000.3.77.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T14:43:36Z", "details": "moderate" } ], "title": "CVE-2022-21713" } ] }
suse-su-2022:4428-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for grafana", "title": "Title of the patch" }, { "category": "description", "text": "This update for grafana fixes the following issues:\n\nVersion update from 8.3.10 to 8.5.13 (jsc#PED-2145):\n\n- Security fixes:\n * CVE-2022-36062: (bsc#1203596)\n * CVE-2022-35957: (bsc#1203597)\n * CVE-2022-31107: (bsc#1201539)\n * CVE-2022-31097: (bsc#1201535)\n * CVE-2022-29170: (bsc#1199810)\n * CVE-2021-43813, CVE-2021-43815: (bsc#1193686)\n * CVE-2021-43798: (bsc#1193492)\n * CVE-2021-41244: (bsc#1192763)\n * CVE-2021-41174: (bsc#1192383)\n * CVE-2021-3711: (bsc#1189520)\n * CVE-2021-36222: (bsc#1188571)\n\n- Features and enhancements:\n * AccessControl: Disable user remove and user update roles when they do not have the permissions\n * AccessControl: Provisioning for teams\n * Alerting: Add custom grouping to Alert Panel\n * Alerting: Add safeguard for migrations that might cause dataloss\n * Alerting: AlertingProxy to elevate permissions for request forwarded to data proxy when RBAC enabled\n * Alerting: Grafana uses \u003e instead of \u003e= when checking the For duration\n * Alerting: Move slow queries in the scheduler to another goroutine\n * Alerting: Remove disabled flag for data source when migrating alerts\n * Alerting: Show notification tab of legacy alerting only to editor\n * Alerting: Update migration to migrate only alerts that belon to existing org\\dashboard\n * Alerting: Use expanded labels in dashboard annotations\n * Alerting: Use time.Ticker instead of alerting.Ticker in ngalert\n * Analytics: Add user id tracking to google analytics\n * Angular: Add AngularJS plugin support deprecation plan to docs site\n * API: Add usage stats preview endpoint\n * API: Extract OpenAPI specification from source code using go-swagger\n * Auth: implement auto_sign_up for auth.jwt\n * Azure monitor Logs: Optimize data fetching in resource picker\n * Azure Monitor Logs: Order subscriptions in resource picker by name\n * Azure Monitor: Include datasource ref when interpolating variables.\n * AzureMonitor: Add support for not equals and startsWith operators when creating Azure Metrics dimension filters.\n * AzureMonitor: Do not quote variables when a custom \u0027All\u0027 variable option is used\n * AzureMonitor: Filter list of resources by resourceType\n * AzureMonitor: Update allowed namespaces\n * BarChart: color by field, x time field, bar radius, label skipping\n * Chore: Implement OpenTelemetry in Grafana\n * Cloud Monitoring: Adds metric type to Metric drop down options\n * CloudMonitor: Correctly encode default project response\n * CloudWatch: Add all ElastiCache Redis Metrics\n * CloudWatch: Add Data Lifecycle Manager metrics and dimension\n * CloudWatch: Add Missing Elasticache Host-level metrics\n * CloudWatch: Add multi-value template variable support for log group names in logs query builder\n * CloudWatch: Add new AWS/ES metrics. #43034, @sunker\n * Cloudwatch: Add support for AWS/PrivateLink* metrics and dimensions\n * Cloudwatch: Add support for new AWS/RDS EBS* metrics\n * Cloudwatch: Add syntax highlighting and autocomplete for \u0027Metric Search\u0027\n * Cloudwatch: Add template variable query function for listing log groups\n * Configuration: Add ability to customize okta login button name and icon\n * Elasticsearch: Add deprecation notice for \u003c 7.10 versions.\n * Explore: Support custom display label for exemplar links for Prometheus datasource\n * Hotkeys: Make time range absolute/permanent\n * InfluxDB: Use backend for influxDB by default via feature toggle\n * Legend: Use correct unit for percent and count calculations\n * Logs: Escape windows newline into single newline\n * Loki: Add unpack to autocomplete suggestions\n * Loki: Use millisecond steps in Grafana 8.5.x.\n * Playlists: Enable sharing direct links to playlists\n * Plugins: Allow using both Function and Class components for app plugins\n * Plugins: Expose emotion/react to plugins to prevent load failures\n * Plugins: Introduce HTTP 207 Multi Status response to api/ds/query\n * Rendering: Add support for renderer token\n * Setting: Support configuring feature toggles with bools instead of just passing an array\n * SQLStore: Prevent concurrent migrations\n * SSE: Add Mode to drop NaN/Inf/Null in Reduction operations\n * Tempo: Switch out Select with AsyncSelect component to get loading state in Tempo Search\n * TimeSeries: Add migration for Graph panel\u0027s transform series override\n * TimeSeries: Add support for negative Y and constant transform\n * TimeSeries: Preserve null/undefined values when performing negative y transform\n * Traces: Filter by service/span name and operation in Tempo and Jaeger\n * Transformations: Add \u0027JSON\u0027 field type to ConvertFieldTypeTransformer\n * Transformations: Add an All Unique Values Reducer\n * Transformers: avoid error when the ExtractFields source field is missing\n\n- Breaking changes:\n * For a data source query made via /api/ds/query:\n + If the DatasourceQueryMultiStatus feature is enabled and the data source response has an error set as part of the\n DataResponse, the resulting HTTP status code is now \u0027207 Multi Status\u0027 instead of \u0027400 Bad gateway\u0027\n + If the DatasourceQueryMultiStatus feature is not enabled and the data source response has an error set as part of\n the DataResponse, the resulting HTTP status code is \u0027400 BadRequest\u0027 (no breaking change)\n * For a proxied request, e.g. Grafana\u0027s datasource or plugin proxy: \n + If the request is cancelled, e.g. from the browser/by the client, the HTTP status code is now \u0027499 Client closed\u0027\n request instead of 502 Bad gateway If the request times out, e.g. takes longer time than allowed, the HTTP status\n code is now \u0027504 Gateway timeout\u0027 instead of \u0027502 Bad gateway\u0027.\n + The change in behavior is that negative-valued series are now stacked downwards from 0 (in their own stacks),\n rather than downwards from the top of the positive stacks. We now automatically group stacks by Draw style, Line\n interpolation, and Bar alignment, making it impossible to stack bars on top of lines, or smooth lines on top of\n stepped lines\n + The meaning of the default data source has now changed from being a persisted property in a panel. Before when\n you selected the default data source for a panel and later changed the default data source to another data source\n it would change all panels who were configured to use the default data source. From now on the default data\n source is just the default for new panels and changing the default will not impact any currently saved dashboards\n + The Tooltip component provided by @grafana/ui is no longer automatically interactive (that is you can hover onto\n it and click a link or select text). It will from now on by default close automatically when you mouse out\n from the trigger element. To make tooltips behave like before set the new interactive property to true.\n\n- Deprecations:\n * /api/tsdb/query API has been deprecated, please use /api/ds/query instead\n * AngularJS plugin support is now in a deprecated state. The documentation site has an article with more details on why, when, and how\n \n- Bug fixes:\n * Alerting: Add contact points provisioning API\n * Alerting: add field for custom slack endpoint\n * Alerting: Add resolved count to notification title when both firing and resolved present\n * Alerting: Alert rule should wait For duration when execution error state is Alerting\n * Alerting: Allow disabling override timings for notification policies\n * Alerting: Allow serving images from custom url path\n * Alerting: Apply Custom Headers to datasource queries\n * Alerting: Classic conditions can now display multiple values\n * Alerting: correctly show all alerts in a folder\n * Alerting: Display query from grafana-managed alert rules on /api/v1/rules\n * Alerting: Do not overwrite existing alert rule condition\n * Alerting: Enhance support for arbitrary group names in managed alerts\n * Alerting: Fix access to alerts for viewer with editor permissions when RBAC is disabled\n * Alerting: Fix anonymous access to alerting\n * Alerting: Fix migrations by making send_alerts_to field nullable\n * Alerting: Fix RBAC actions for notification policies\n * Alerting: Fix use of \u003e instead of \u003e= when checking the For duration\n * Alerting: Remove double quotes from matchers\n * API: Include userId, orgId, uname in request logging middleware\n * Auth: Guarantee consistency of signed SigV4 headers\n * Azure Monitor : Adding json formatting of error messages in Panel Header Corner and Inspect Error Tab\n * Azure Monitor: Add 2 more Curated Dashboards for VM Insights\n * Azure Monitor: Bug Fix for incorrect variable cascading for template variables\n * Azure Monitor: Fix space character encoding for metrics query link to Azure Portal\n * Azure Monitor: Fixes broken log queries that use workspace\n * Azure Monitor: Small bug fixes for Resource Picker\n * AzureAd Oauth: Fix strictMode to reject users without an assigned role\n * AzureMonitor: Fixes metric definition for Azure Storage queue/file/blob/table resources\n * Cloudwatch : Fixed reseting metric name when changing namespace in Metric Query\n * CloudWatch: Added missing MemoryDB Namespace metrics\n * CloudWatch: Fix MetricName resetting on Namespace change.\n * Cloudwatch: Fix template variables in variable queries.\n * CloudWatch: Fix variable query tag migration\n * CloudWatch: Handle new error codes for MetricInsights\n * CloudWatch: List all metrics properly in SQL autocomplete\n * CloudWatch: Prevent log groups from being removed on query change\n * CloudWatch: Remove error message when using multi-valued template vars in region field\n * CloudWatch: Run query on blur in logs query field\n * CloudWatch: Use default http client from aws-sdk-go\n * Dashboard: Fix dashboard update permission check\n * Dashboard: Fixes random scrolling on time range change\n * Dashboard: Template variables are now correctly persisted when clicking breadcrumb links\n * DashboardExport: Fix exporting and importing dashboards where query data source ended up as incorrect\n * DashboardPage: Remember scroll position when coming back panel edit / view panel\n * Dashboards: Fixes repeating by row and no refresh\n * Dashboards: Show changes in save dialog\n * DataSource: Default data source is no longer a persisted state but just the default data source for new panels\n * DataSourcePlugin API: Allow queries import when changing data source type\n * Elasticsearch: Respect maxConcurrentShardRequests datasource setting\n * Explore: Allow users to save Explore state to a new panel in a new dashboard\n * Explore: Avoid locking timepicker when range is inverted.\n * Explore: Fix closing split pane when logs panel is used\n * Explore: Prevent direct access to explore if disabled via feature toggle\n * Explore: Remove return to panel button\n * FileUpload: clicking the Upload file button now opens their modal correctly\n * Gauge: Fixes blank viz when data link exists and orientation was horizontal\n * GrafanaUI: Fix color of links in error Tooltips in light theme\n * Histogram Panel: Take decimal into consideration\n * InfluxDB: Fixes invalid no data alerts. #48295, @yesoreyeram\n * Instrumentation: Fix HTTP request instrumentation of authentication failures\n * Instrumentation: Make backend plugin metrics endpoints available with optional authentication\n * Instrumentation: Proxy status code correction and various improvements\n * LibraryPanels: Fix library panels not connecting properly in imported dashboards\n * LibraryPanels: Prevent long descriptions and names from obscuring the delete button\n * Logger: Use specified format for file logger\n * Logging: Introduce feature toggle to activate gokit/log format\n * Logs: Handle missing fields in dataframes better\n * Loki: Improve unpack parser handling\n * ManageDashboards: Fix error when deleting all dashboards from folder view\n * Middleware: Fix IPv6 host parsing in CSRF check\n * Navigation: Prevent navbar briefly showing on login\n * NewsPanel: Add support for Atom feeds. #45390, @kaydelaney\n * OAuth: Fix parsing of ID token if header contains non-string value\n * Panel Edit: Options search now works correctly when a logarithmic scale option is set\n * Panel Edit: Visualization search now works correctly with special characters\n * Plugins Catalog: Fix styling of hyperlinks\n * Plugins: Add deprecation notice for /api/tsdb/query endpoint\n * Plugins: Adding support for traceID field to accept variables\n * Plugins: Ensure catching all appropriate 4xx api/ds/query scenarios\n * Postgres: Return tables with hyphenated schemes\n * PostgreSQL: __unixEpochGroup to support arithmetic expression as argument\n * Profile/Help: Expose option to disable profile section and help menu\n * Prometheus: Enable new visual query builder by default\n * Provisioning: Fix duplicate validation when multiple organizations have been configured inserted\n * RBAC: Fix Anonymous Editors missing dashboard controls\n * RolePicker: Fix menu position on smaller screens\n * SAML: Allow disabling of SAML signups\n * Search: Sort results correctly when using postgres\n * Security: Fixes minor code scanning security warnings in old vendored javascript libs\n * Table panel: Fix horizontal scrolling when pagination is enabled\n * Table panel: Show datalinks for cell display modes JSON View and Gauge derivates\n * Table: Fix filter crashes table\n * Table: New pagination option\n * TablePanel: Add cell inspect option\n * TablePanel: Do not prefix columns with frame name if multipleframes and override active\n * TagsInput: Fix tags remove button accessibility issues\n * Tempo / Trace Viewer: Support Span Links in Trace Viewer\n * Tempo: Download span references in data inspector\n * Tempo: Separate trace to logs and loki search datasource config\n * TextPanel: Sanitize after markdown has been rendered to html\n * TimeRange: Fixes updating time range from url and browser history\n * TimeSeries: Fix detection \u0026 rendering of sparse datapoints\n * Timeseries: Fix outside range stale state\n * TimeSeries: Properly stack series with missing datapoints\n * TimeSeries: Sort tooltip values based on raw values\n * Tooltip: Fix links not legible in Tooltips when using light theme\n * Tooltip: Sort decimals using standard numeric compare\n * Trace View: Show number of child spans\n * Transformations: Support escaped characters in key-value pair parsing\n * Transforms: Labels to fields, fix label picker layout\n * Variables: Ensure variables in query params are correctly recognised\n * Variables: Fix crash when changing query variable datasource\n * Variables: Fixes issue with data source variables not updating queries with variable\n * Visualizations: Stack negative-valued series downwards\n\n- Plugin development fixes:\n * Card: Increase clickable area when meta items are present.\n * ClipboardButton: Use a fallback when the Clipboard API is unavailable\n * Loki: Fix operator description propup from being shortened.\n * OAuth: Add setting to skip org assignment for external users\n * Tooltips: Make tooltips non interactive by default\n * Tracing: Add option to map tag names to log label names in trace to logs settings\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-4428,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-4428,openSUSE-SLE-15.3-2022-4428,openSUSE-SLE-15.4-2022-4428", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4428-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:4428-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224428-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:4428-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013218.html" }, { "category": "self", "summary": "SUSE Bug 1188571", "url": "https://bugzilla.suse.com/1188571" }, { "category": "self", "summary": "SUSE Bug 1189520", "url": "https://bugzilla.suse.com/1189520" }, { "category": "self", "summary": "SUSE Bug 1192383", "url": "https://bugzilla.suse.com/1192383" }, { "category": "self", "summary": "SUSE Bug 1192763", "url": "https://bugzilla.suse.com/1192763" }, { "category": "self", "summary": "SUSE Bug 1193492", "url": "https://bugzilla.suse.com/1193492" }, { "category": "self", "summary": "SUSE Bug 1193686", "url": "https://bugzilla.suse.com/1193686" }, { "category": "self", "summary": "SUSE Bug 1199810", "url": "https://bugzilla.suse.com/1199810" }, { "category": "self", "summary": "SUSE Bug 1201535", "url": "https://bugzilla.suse.com/1201535" }, { "category": "self", "summary": "SUSE Bug 1201539", "url": "https://bugzilla.suse.com/1201539" }, { "category": "self", "summary": "SUSE Bug 1203596", "url": "https://bugzilla.suse.com/1203596" }, { "category": "self", "summary": "SUSE Bug 1203597", "url": "https://bugzilla.suse.com/1203597" }, { "category": "self", "summary": "SUSE CVE CVE-2021-36222 page", "url": "https://www.suse.com/security/cve/CVE-2021-36222/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3711 page", "url": "https://www.suse.com/security/cve/CVE-2021-3711/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41174 page", "url": "https://www.suse.com/security/cve/CVE-2021-41174/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41244 page", "url": "https://www.suse.com/security/cve/CVE-2021-41244/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43798 page", "url": "https://www.suse.com/security/cve/CVE-2021-43798/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43813 page", "url": "https://www.suse.com/security/cve/CVE-2021-43813/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43815 page", "url": "https://www.suse.com/security/cve/CVE-2021-43815/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29170 page", "url": "https://www.suse.com/security/cve/CVE-2022-29170/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-31097 page", "url": "https://www.suse.com/security/cve/CVE-2022-31097/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-31107 page", "url": "https://www.suse.com/security/cve/CVE-2022-31107/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-35957 page", "url": "https://www.suse.com/security/cve/CVE-2022-35957/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-36062 page", "url": "https://www.suse.com/security/cve/CVE-2022-36062/" } ], "title": "Security update for grafana", "tracking": { "current_release_date": "2022-12-13T07:29:50Z", "generator": { "date": "2022-12-13T07:29:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:4428-1", "initial_release_date": "2022-12-13T07:29:50Z", "revision_history": [ { "date": "2022-12-13T07:29:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "grafana-8.5.13-150200.3.29.5.aarch64", "product": { "name": "grafana-8.5.13-150200.3.29.5.aarch64", "product_id": "grafana-8.5.13-150200.3.29.5.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "grafana-8.5.13-150200.3.29.5.i586", "product": { "name": "grafana-8.5.13-150200.3.29.5.i586", "product_id": "grafana-8.5.13-150200.3.29.5.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "grafana-8.5.13-150200.3.29.5.ppc64le", "product": { "name": "grafana-8.5.13-150200.3.29.5.ppc64le", "product_id": "grafana-8.5.13-150200.3.29.5.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "grafana-8.5.13-150200.3.29.5.s390x", "product": { "name": "grafana-8.5.13-150200.3.29.5.s390x", "product_id": "grafana-8.5.13-150200.3.29.5.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "grafana-8.5.13-150200.3.29.5.x86_64", "product": { "name": "grafana-8.5.13-150200.3.29.5.x86_64", "product_id": "grafana-8.5.13-150200.3.29.5.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Package Hub 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Package Hub 15 SP4", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:15:sp4" } } }, { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-150200.3.29.5.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64" }, "product_reference": "grafana-8.5.13-150200.3.29.5.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-150200.3.29.5.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le" }, "product_reference": "grafana-8.5.13-150200.3.29.5.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-150200.3.29.5.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x" }, "product_reference": "grafana-8.5.13-150200.3.29.5.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-150200.3.29.5.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64" }, "product_reference": "grafana-8.5.13-150200.3.29.5.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-150200.3.29.5.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64" }, "product_reference": "grafana-8.5.13-150200.3.29.5.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-150200.3.29.5.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le" }, "product_reference": "grafana-8.5.13-150200.3.29.5.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-150200.3.29.5.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x" }, "product_reference": "grafana-8.5.13-150200.3.29.5.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-150200.3.29.5.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64" }, "product_reference": "grafana-8.5.13-150200.3.29.5.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-150200.3.29.5.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64" }, "product_reference": "grafana-8.5.13-150200.3.29.5.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-150200.3.29.5.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le" }, "product_reference": "grafana-8.5.13-150200.3.29.5.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-150200.3.29.5.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x" }, "product_reference": "grafana-8.5.13-150200.3.29.5.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-150200.3.29.5.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" }, "product_reference": "grafana-8.5.13-150200.3.29.5.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-36222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-36222" } ], "notes": [ { "category": "general", "text": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-36222", "url": "https://www.suse.com/security/cve/CVE-2021-36222" }, { "category": "external", "summary": "SUSE Bug 1188571 for CVE-2021-36222", "url": "https://bugzilla.suse.com/1188571" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:29:50Z", "details": "important" } ], "title": "CVE-2021-36222" }, { "cve": "CVE-2021-3711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3711" } ], "notes": [ { "category": "general", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3711", "url": "https://www.suse.com/security/cve/CVE-2021-3711" }, { "category": "external", "summary": "SUSE Bug 1189520 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1189520" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1205663 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1205663" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:29:50Z", "details": "critical" } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2021-41174", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41174" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions if an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim\u0027s browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} ex: {{constructor.constructor(\u0027alert(1)\u0027)()}}. When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. Users are advised to upgrade as soon as possible. If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string {{ in the path.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41174", "url": "https://www.suse.com/security/cve/CVE-2021-41174" }, { "category": "external", "summary": "SUSE Bug 1192383 for CVE-2021-41174", "url": "https://bugzilla.suse.com/1192383" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:29:50Z", "details": "moderate" } ], "title": "CVE-2021-41174" }, { "cve": "CVE-2021-41244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41244" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions when the fine-grained access control beta feature is enabled and there is more than one organization in the Grafana instance admins are able to access users from other organizations. Grafana 8.0 introduced a mechanism which allowed users with the Organization Admin role to list, add, remove, and update users\u0027 roles in other organizations in which they are not an admin. With fine-grained access control enabled, organization admins can list, add, remove and update users\u0027 roles in another organization, where they do not have organization admin role. All installations between v8.0 and v8.2.3 that have fine-grained access control beta enabled and more than one organization should be upgraded as soon as possible. If you cannot upgrade, you should turn off the fine-grained access control using a feature flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41244", "url": "https://www.suse.com/security/cve/CVE-2021-41244" }, { "category": "external", "summary": "SUSE Bug 1192763 for CVE-2021-41244", "url": "https://bugzilla.suse.com/1192763" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:29:50Z", "details": "critical" } ], "title": "CVE-2021-41244" }, { "cve": "CVE-2021-43798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43798" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `\u003cgrafana_host_url\u003e/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43798", "url": "https://www.suse.com/security/cve/CVE-2021-43798" }, { "category": "external", "summary": "SUSE Bug 1193492 for CVE-2021-43798", "url": "https://bugzilla.suse.com/1193492" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:29:50Z", "details": "important" } ], "title": "CVE-2021-43798" }, { "cve": "CVE-2021-43813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43813" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 contains a directory traversal vulnerability for fully lowercase or fully uppercase .md files. The vulnerability is limited in scope, and only allows access to files with the extension .md to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Users should upgrade to patched versions 8.3.2 or 7.5.12. For users who cannot upgrade, running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths. Alternatively, for fully lowercase or fully uppercase .md files, users can block /api/plugins/.*/markdown/.* without losing any functionality beyond inlined plugin help text.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43813", "url": "https://www.suse.com/security/cve/CVE-2021-43813" }, { "category": "external", "summary": "SUSE Bug 1193686 for CVE-2021-43813", "url": "https://bugzilla.suse.com/1193686" }, { "category": "external", "summary": "SUSE Bug 1193688 for CVE-2021-43813", "url": "https://bugzilla.suse.com/1193688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:29:50Z", "details": "moderate" } ], "title": "CVE-2021-43813" }, { "cve": "CVE-2021-43815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43815" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 has a directory traversal for arbitrary .csv files. It only affects instances that have the developer testing tool called TestData DB data source enabled and configured. The vulnerability is limited in scope, and only allows access to files with the extension .csv to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Versions 8.3.2 and 7.5.12 contain a patch for this issue. There is a workaround available for users who cannot upgrade. Running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43815", "url": "https://www.suse.com/security/cve/CVE-2021-43815" }, { "category": "external", "summary": "SUSE Bug 1193686 for CVE-2021-43815", "url": "https://bugzilla.suse.com/1193686" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:29:50Z", "details": "moderate" } ], "title": "CVE-2021-43815" }, { "cve": "CVE-2022-29170", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29170" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn\u0027t call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29170", "url": "https://www.suse.com/security/cve/CVE-2022-29170" }, { "category": "external", "summary": "SUSE Bug 1199810 for CVE-2022-29170", "url": "https://bugzilla.suse.com/1199810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:29:50Z", "details": "moderate" } ], "title": "CVE-2022-29170" }, { "cve": "CVE-2022-31097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-31097" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Versions on the 8.x and 9.x branch prior to 9.0.3, 8.5.9, 8.4.10, and 8.3.10 are vulnerable to stored cross-site scripting via the Unified Alerting feature of Grafana. An attacker can exploit this vulnerability to escalate privilege from editor to admin by tricking an authenticated admin to click on a link. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch. As a workaround, it is possible to disable alerting or use legacy alerting.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-31097", "url": "https://www.suse.com/security/cve/CVE-2022-31097" }, { "category": "external", "summary": "SUSE Bug 1201535 for CVE-2022-31097", "url": "https://bugzilla.suse.com/1201535" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:29:50Z", "details": "important" } ], "title": "CVE-2022-31097" }, { "cve": "CVE-2022-31107", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-31107" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user\u0027s external user id is not already associated with an account in Grafana, the malicious user\u0027s email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will be able to log in to the target user\u0027s Grafana account. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch for this issue. As a workaround, concerned users can disable OAuth login to their Grafana instance, or ensure that all users authorized to log in via OAuth have a corresponding user account in Grafana linked to their email address.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-31107", "url": "https://www.suse.com/security/cve/CVE-2022-31107" }, { "category": "external", "summary": "SUSE Bug 1201539 for CVE-2022-31107", "url": "https://bugzilla.suse.com/1201539" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:29:50Z", "details": "important" } ], "title": "CVE-2022-31107" }, { "cve": "CVE-2022-35957", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-35957" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.1.6 and 8.5.13 are vulnerable to an escalation from admin to server admin when auth proxy is used, allowing an admin to take over the server admin account and gain full control of the grafana instance. All installations should be upgraded as soon as possible. As a workaround deactivate auth proxy following the instructions at: https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/auth-proxy/", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-35957", "url": "https://www.suse.com/security/cve/CVE-2022-35957" }, { "category": "external", "summary": "SUSE Bug 1203597 for CVE-2022-35957", "url": "https://bugzilla.suse.com/1203597" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:29:50Z", "details": "moderate" } ], "title": "CVE-2022-35957" }, { "cve": "CVE-2022-36062", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-36062" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In versions prior to 8.5.13, 9.0.9, and 9.1.6, Grafana is subject to Improper Preservation of Permissions resulting in privilege escalation on some folders where Admin is the only used permission. The vulnerability impacts Grafana instances where RBAC was disabled and enabled afterwards, as the migrations which are translating legacy folder permissions to RBAC permissions do not account for the scenario where the only user permission in the folder is Admin, as a result RBAC adds permissions for Editors and Viewers which allow them to edit and view folders accordingly. This issue has been patched in versions 8.5.13, 9.0.9, and 9.1.6. A workaround when the impacted folder/dashboard is known is to remove the additional permissions manually.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-36062", "url": "https://www.suse.com/security/cve/CVE-2022-36062" }, { "category": "external", "summary": "SUSE Bug 1203596 for CVE-2022-36062", "url": "https://bugzilla.suse.com/1203596" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.3:grafana-8.5.13-150200.3.29.5.x86_64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.aarch64", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.ppc64le", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.s390x", "openSUSE Leap 15.4:grafana-8.5.13-150200.3.29.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-12-13T07:29:50Z", "details": "moderate" } ], "title": "CVE-2022-36062" } ] }
suse-su-2021:2833-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssl-1_1", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssl-1_1 fixes the following security issues:\n\n- CVE-2021-3711: A bug in the implementation of the SM2 decryption code could\n lead to buffer overflows. [bsc#1189520]\n\n- CVE-2021-3712: a bug in the code for printing certificate details could\n lead to a buffer overrun that a malicious actor could exploit to crash\n the application, causing a denial-of-service attack. [bsc#1189521]\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-2833,SUSE-OpenStack-Cloud-9-2021-2833,SUSE-OpenStack-Cloud-Crowbar-9-2021-2833,SUSE-SLE-SAP-12-SP4-2021-2833,SUSE-SLE-SDK-12-SP5-2021-2833,SUSE-SLE-SERVER-12-SP4-LTSS-2021-2833,SUSE-SLE-SERVER-12-SP5-2021-2833", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2833-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:2833-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212833-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:2833-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009346.html" }, { "category": "self", "summary": "SUSE Bug 1189520", "url": "https://bugzilla.suse.com/1189520" }, { "category": "self", "summary": "SUSE Bug 1189521", "url": "https://bugzilla.suse.com/1189521" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3711 page", "url": "https://www.suse.com/security/cve/CVE-2021-3711/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3712 page", "url": "https://www.suse.com/security/cve/CVE-2021-3712/" } ], "title": "Security update for openssl-1_1", "tracking": { "current_release_date": "2021-08-24T14:21:30Z", "generator": { "date": "2021-08-24T14:21:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:2833-1", "initial_release_date": "2021-08-24T14:21:30Z", "revision_history": [ { "date": "2021-08-24T14:21:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1d-2.36.2.aarch64", "product": { "name": "libopenssl-1_1-devel-1.1.1d-2.36.2.aarch64", "product_id": "libopenssl-1_1-devel-1.1.1d-2.36.2.aarch64" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1d-2.36.2.aarch64", "product": { "name": "libopenssl1_1-1.1.1d-2.36.2.aarch64", "product_id": "libopenssl1_1-1.1.1d-2.36.2.aarch64" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1d-2.36.2.aarch64", "product": { "name": "openssl-1_1-1.1.1d-2.36.2.aarch64", "product_id": "openssl-1_1-1.1.1d-2.36.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-64bit-1.1.1d-2.36.2.aarch64_ilp32", "product": { "name": "libopenssl-1_1-devel-64bit-1.1.1d-2.36.2.aarch64_ilp32", "product_id": "libopenssl-1_1-devel-64bit-1.1.1d-2.36.2.aarch64_ilp32" } }, { "category": "product_version", "name": "libopenssl1_1-64bit-1.1.1d-2.36.2.aarch64_ilp32", "product": { "name": "libopenssl1_1-64bit-1.1.1d-2.36.2.aarch64_ilp32", "product_id": "libopenssl1_1-64bit-1.1.1d-2.36.2.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1d-2.36.2.i586", "product": { "name": "libopenssl-1_1-devel-1.1.1d-2.36.2.i586", "product_id": "libopenssl-1_1-devel-1.1.1d-2.36.2.i586" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1d-2.36.2.i586", "product": { "name": "libopenssl1_1-1.1.1d-2.36.2.i586", "product_id": "libopenssl1_1-1.1.1d-2.36.2.i586" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1d-2.36.2.i586", "product": { "name": "openssl-1_1-1.1.1d-2.36.2.i586", "product_id": "openssl-1_1-1.1.1d-2.36.2.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "openssl-1_1-doc-1.1.1d-2.36.2.noarch", "product": { "name": "openssl-1_1-doc-1.1.1d-2.36.2.noarch", "product_id": "openssl-1_1-doc-1.1.1d-2.36.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1d-2.36.2.ppc64le", "product": { "name": "libopenssl-1_1-devel-1.1.1d-2.36.2.ppc64le", "product_id": "libopenssl-1_1-devel-1.1.1d-2.36.2.ppc64le" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1d-2.36.2.ppc64le", "product": { "name": "libopenssl1_1-1.1.1d-2.36.2.ppc64le", "product_id": "libopenssl1_1-1.1.1d-2.36.2.ppc64le" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1d-2.36.2.ppc64le", "product": { "name": "openssl-1_1-1.1.1d-2.36.2.ppc64le", "product_id": "openssl-1_1-1.1.1d-2.36.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1d-2.36.2.s390", "product": { "name": "libopenssl-1_1-devel-1.1.1d-2.36.2.s390", "product_id": "libopenssl-1_1-devel-1.1.1d-2.36.2.s390" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1d-2.36.2.s390", "product": { "name": "libopenssl1_1-1.1.1d-2.36.2.s390", "product_id": "libopenssl1_1-1.1.1d-2.36.2.s390" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1d-2.36.2.s390", "product": { "name": "openssl-1_1-1.1.1d-2.36.2.s390", "product_id": "openssl-1_1-1.1.1d-2.36.2.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1d-2.36.2.s390x", "product": { "name": "libopenssl-1_1-devel-1.1.1d-2.36.2.s390x", "product_id": "libopenssl-1_1-devel-1.1.1d-2.36.2.s390x" } }, { "category": "product_version", "name": "libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.s390x", "product": { "name": "libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.s390x", "product_id": "libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.s390x" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1d-2.36.2.s390x", "product": { "name": "libopenssl1_1-1.1.1d-2.36.2.s390x", "product_id": "libopenssl1_1-1.1.1d-2.36.2.s390x" } }, { "category": "product_version", "name": "libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "product": { "name": "libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "product_id": "libopenssl1_1-32bit-1.1.1d-2.36.2.s390x" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1d-2.36.2.s390x", "product": { "name": "openssl-1_1-1.1.1d-2.36.2.s390x", "product_id": "openssl-1_1-1.1.1d-2.36.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1d-2.36.2.x86_64", "product": { "name": "libopenssl-1_1-devel-1.1.1d-2.36.2.x86_64", "product_id": "libopenssl-1_1-devel-1.1.1d-2.36.2.x86_64" } }, { "category": "product_version", "name": "libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.x86_64", "product": { "name": "libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.x86_64", "product_id": "libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.x86_64" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1d-2.36.2.x86_64", "product": { "name": "libopenssl1_1-1.1.1d-2.36.2.x86_64", "product_id": "libopenssl1_1-1.1.1d-2.36.2.x86_64" } }, { "category": "product_version", "name": "libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "product": { "name": "libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "product_id": "libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1d-2.36.2.x86_64", "product": { "name": "openssl-1_1-1.1.1d-2.36.2.x86_64", "product_id": "openssl-1_1-1.1.1d-2.36.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-2.36.2.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:libopenssl1_1-1.1.1d-2.36.2.x86_64" }, "product_reference": "libopenssl1_1-1.1.1d-2.36.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64" }, "product_reference": "libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-2.36.2.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:openssl-1_1-1.1.1d-2.36.2.x86_64" }, "product_reference": "openssl-1_1-1.1.1d-2.36.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-2.36.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-1.1.1d-2.36.2.x86_64" }, "product_reference": "libopenssl1_1-1.1.1d-2.36.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64" }, "product_reference": "libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-2.36.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:openssl-1_1-1.1.1d-2.36.2.x86_64" }, "product_reference": "openssl-1_1-1.1.1d-2.36.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-2.36.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.36.2.ppc64le" }, "product_reference": "libopenssl1_1-1.1.1d-2.36.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-2.36.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.36.2.x86_64" }, "product_reference": "libopenssl1_1-1.1.1d-2.36.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64" }, "product_reference": "libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-2.36.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.36.2.ppc64le" }, "product_reference": "openssl-1_1-1.1.1d-2.36.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-2.36.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.36.2.x86_64" }, "product_reference": "openssl-1_1-1.1.1d-2.36.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1d-2.36.2.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.aarch64" }, "product_reference": "libopenssl-1_1-devel-1.1.1d-2.36.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1d-2.36.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.ppc64le" }, "product_reference": "libopenssl-1_1-devel-1.1.1d-2.36.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1d-2.36.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.s390x" }, "product_reference": "libopenssl-1_1-devel-1.1.1d-2.36.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1d-2.36.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.x86_64" }, "product_reference": "libopenssl-1_1-devel-1.1.1d-2.36.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.s390x" }, "product_reference": "libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.x86_64" }, "product_reference": "libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-2.36.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.aarch64" }, "product_reference": "libopenssl1_1-1.1.1d-2.36.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-2.36.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.ppc64le" }, "product_reference": "libopenssl1_1-1.1.1d-2.36.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-2.36.2.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.s390x" }, "product_reference": "libopenssl1_1-1.1.1d-2.36.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-2.36.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.x86_64" }, "product_reference": "libopenssl1_1-1.1.1d-2.36.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-32bit-1.1.1d-2.36.2.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x" }, "product_reference": "libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64" }, "product_reference": "libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-2.36.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.aarch64" }, "product_reference": "openssl-1_1-1.1.1d-2.36.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-2.36.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.ppc64le" }, "product_reference": "openssl-1_1-1.1.1d-2.36.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-2.36.2.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.s390x" }, "product_reference": "openssl-1_1-1.1.1d-2.36.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-2.36.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.x86_64" }, "product_reference": "openssl-1_1-1.1.1d-2.36.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-2.36.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.aarch64" }, "product_reference": "libopenssl1_1-1.1.1d-2.36.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-2.36.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.ppc64le" }, "product_reference": "libopenssl1_1-1.1.1d-2.36.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-2.36.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.s390x" }, "product_reference": "libopenssl1_1-1.1.1d-2.36.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-2.36.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.x86_64" }, "product_reference": "libopenssl1_1-1.1.1d-2.36.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-32bit-1.1.1d-2.36.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x" }, "product_reference": "libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64" }, "product_reference": "libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-2.36.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.aarch64" }, "product_reference": "openssl-1_1-1.1.1d-2.36.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-2.36.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.ppc64le" }, "product_reference": "openssl-1_1-1.1.1d-2.36.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-2.36.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.s390x" }, "product_reference": "openssl-1_1-1.1.1d-2.36.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-2.36.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.x86_64" }, "product_reference": "openssl-1_1-1.1.1d-2.36.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-2.36.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.aarch64" }, "product_reference": "libopenssl1_1-1.1.1d-2.36.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-2.36.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.ppc64le" }, "product_reference": "libopenssl1_1-1.1.1d-2.36.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-2.36.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.s390x" }, "product_reference": "libopenssl1_1-1.1.1d-2.36.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-2.36.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.x86_64" }, "product_reference": "libopenssl1_1-1.1.1d-2.36.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-32bit-1.1.1d-2.36.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x" }, "product_reference": "libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64" }, "product_reference": "libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-2.36.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.aarch64" }, "product_reference": "openssl-1_1-1.1.1d-2.36.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-2.36.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.ppc64le" }, "product_reference": "openssl-1_1-1.1.1d-2.36.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-2.36.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.s390x" }, "product_reference": "openssl-1_1-1.1.1d-2.36.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-2.36.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.x86_64" }, "product_reference": "openssl-1_1-1.1.1d-2.36.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3711" } ], "notes": [ { "category": "general", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud 9:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud 9:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud 9:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:openssl-1_1-1.1.1d-2.36.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3711", "url": "https://www.suse.com/security/cve/CVE-2021-3711" }, { "category": "external", "summary": "SUSE Bug 1189520 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1189520" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1205663 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1205663" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud 9:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud 9:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud 9:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:openssl-1_1-1.1.1d-2.36.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud 9:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud 9:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud 9:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:openssl-1_1-1.1.1d-2.36.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-08-24T14:21:30Z", "details": "critical" } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3712" } ], "notes": [ { "category": "general", "text": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud 9:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud 9:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud 9:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:openssl-1_1-1.1.1d-2.36.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3712", "url": "https://www.suse.com/security/cve/CVE-2021-3712" }, { "category": "external", "summary": "SUSE Bug 1189521 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1189521" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1191640 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1191640" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1192787 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1192787" }, { "category": "external", "summary": "SUSE Bug 1194948 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1194948" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud 9:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud 9:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud 9:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:openssl-1_1-1.1.1d-2.36.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.36.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud 9:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud 9:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud 9:openssl-1_1-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:libopenssl1_1-32bit-1.1.1d-2.36.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:openssl-1_1-1.1.1d-2.36.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-08-24T14:21:30Z", "details": "moderate" } ], "title": "CVE-2021-3712" } ] }
suse-su-2022:3676-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for grafana", "title": "Title of the patch" }, { "category": "description", "text": "This update for grafana fixes the following issues:\n\nUpdated to version 8.5.13 (jsc#PED-2145, jsc#SLE-23439, jsc#SLE-23422, jsc#SLE-24565): \n \n- CVE-2022-36062: Fixed RBAC folders/dashboards privilege escalation (bsc#1203596). \n- CVE-2022-35957: Fixed escalation from admin to server admin when auth proxy is used (bsc#1203597). \n- CVE-2022-31107: Fixed OAuth account takeover (bsc#1201539). \n- CVE-2022-31097: Fixed XSS vulnerability in the Unified Alerting (bsc#1201535). \n- CVE-2022-21702: Fixed XSS vulnerability in handling data sources (bsc#1195726). \n- CVE-2022-21703: Fixed cross-origin request forgery vulnerability (bsc#1195727). \n- CVE-2022-21713: Fixed Insecure Direct Object Reference vulnerability in Teams API (bsc#1195728). \n- CVE-2022-21673: Fixed missing error return in GetUserInfo if no user was found (bsc#1194873). \n- CVE-2021-43815: Fixed directory traversal for .csv files (bsc#1193686). \n- CVE-2021-41244: Fixed incorrect access control vulnerability(bsc#1192763). \n- CVE-2021-41174: Fixed XSS vulnerability on unauthenticated pages through interpolation binding expressions for AngularJS in URL (bsc#1192383). \n- CVE-2021-3711: Fixed SM2 Decryption Buffer Overflow (bsc#1189520). \n- CVE-2021-36222: Fixed a null pointer dereference in the KDC (bsc#1188571). \n- CVE-2021-43798: Fixed arbitrary file read in the graph native plugin (bsc#1193492). \n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-3676,SUSE-Storage-6-2022-3676", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3676-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:3676-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223676-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:3676-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012594.html" }, { "category": "self", "summary": "SUSE Bug 1188571", "url": "https://bugzilla.suse.com/1188571" }, { "category": "self", "summary": "SUSE Bug 1189520", "url": "https://bugzilla.suse.com/1189520" }, { "category": "self", "summary": "SUSE Bug 1192383", "url": "https://bugzilla.suse.com/1192383" }, { "category": "self", "summary": "SUSE Bug 1192763", "url": "https://bugzilla.suse.com/1192763" }, { "category": "self", "summary": "SUSE Bug 1193492", "url": "https://bugzilla.suse.com/1193492" }, { "category": "self", "summary": "SUSE Bug 1193686", "url": "https://bugzilla.suse.com/1193686" }, { "category": "self", "summary": "SUSE Bug 1194873", "url": "https://bugzilla.suse.com/1194873" }, { "category": "self", "summary": "SUSE Bug 1195726", "url": "https://bugzilla.suse.com/1195726" }, { "category": "self", "summary": "SUSE Bug 1195727", "url": "https://bugzilla.suse.com/1195727" }, { "category": "self", "summary": "SUSE Bug 1195728", "url": "https://bugzilla.suse.com/1195728" }, { "category": "self", "summary": "SUSE Bug 1201535", "url": "https://bugzilla.suse.com/1201535" }, { "category": "self", "summary": "SUSE Bug 1201539", "url": "https://bugzilla.suse.com/1201539" }, { "category": "self", "summary": "SUSE Bug 1203596", "url": "https://bugzilla.suse.com/1203596" }, { "category": "self", "summary": "SUSE Bug 1203597", "url": "https://bugzilla.suse.com/1203597" }, { "category": "self", "summary": "SUSE CVE CVE-2021-36222 page", "url": "https://www.suse.com/security/cve/CVE-2021-36222/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3711 page", "url": "https://www.suse.com/security/cve/CVE-2021-3711/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41174 page", "url": "https://www.suse.com/security/cve/CVE-2021-41174/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41244 page", "url": "https://www.suse.com/security/cve/CVE-2021-41244/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43798 page", "url": "https://www.suse.com/security/cve/CVE-2021-43798/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43815 page", "url": "https://www.suse.com/security/cve/CVE-2021-43815/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21673 page", "url": "https://www.suse.com/security/cve/CVE-2022-21673/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21702 page", "url": "https://www.suse.com/security/cve/CVE-2022-21702/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21703 page", "url": "https://www.suse.com/security/cve/CVE-2022-21703/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21713 page", "url": "https://www.suse.com/security/cve/CVE-2022-21713/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-31097 page", "url": "https://www.suse.com/security/cve/CVE-2022-31097/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-31107 page", "url": "https://www.suse.com/security/cve/CVE-2022-31107/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-35957 page", "url": "https://www.suse.com/security/cve/CVE-2022-35957/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-36062 page", "url": "https://www.suse.com/security/cve/CVE-2022-36062/" } ], "title": "Security update for grafana", "tracking": { "current_release_date": "2022-10-20T11:40:04Z", "generator": { "date": "2022-10-20T11:40:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:3676-1", "initial_release_date": "2022-10-20T11:40:04Z", "revision_history": [ { "date": "2022-10-20T11:40:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "grafana-8.5.13-150100.3.12.1.aarch64", "product": { "name": "grafana-8.5.13-150100.3.12.1.aarch64", "product_id": "grafana-8.5.13-150100.3.12.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "grafana-8.5.13-150100.3.12.1.x86_64", "product": { "name": "grafana-8.5.13-150100.3.12.1.x86_64", "product_id": "grafana-8.5.13-150100.3.12.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Enterprise Storage 6", "product": { "name": "SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-150100.3.12.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64" }, "product_reference": "grafana-8.5.13-150100.3.12.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.5.13-150100.3.12.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" }, "product_reference": "grafana-8.5.13-150100.3.12.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-36222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-36222" } ], "notes": [ { "category": "general", "text": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-36222", "url": "https://www.suse.com/security/cve/CVE-2021-36222" }, { "category": "external", "summary": "SUSE Bug 1188571 for CVE-2021-36222", "url": "https://bugzilla.suse.com/1188571" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-10-20T11:40:04Z", "details": "important" } ], "title": "CVE-2021-36222" }, { "cve": "CVE-2021-3711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3711" } ], "notes": [ { "category": "general", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3711", "url": "https://www.suse.com/security/cve/CVE-2021-3711" }, { "category": "external", "summary": "SUSE Bug 1189520 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1189520" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1205663 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1205663" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-10-20T11:40:04Z", "details": "critical" } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2021-41174", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41174" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions if an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim\u0027s browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} ex: {{constructor.constructor(\u0027alert(1)\u0027)()}}. When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. Users are advised to upgrade as soon as possible. If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string {{ in the path.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41174", "url": "https://www.suse.com/security/cve/CVE-2021-41174" }, { "category": "external", "summary": "SUSE Bug 1192383 for CVE-2021-41174", "url": "https://bugzilla.suse.com/1192383" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-10-20T11:40:04Z", "details": "moderate" } ], "title": "CVE-2021-41174" }, { "cve": "CVE-2021-41244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41244" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions when the fine-grained access control beta feature is enabled and there is more than one organization in the Grafana instance admins are able to access users from other organizations. Grafana 8.0 introduced a mechanism which allowed users with the Organization Admin role to list, add, remove, and update users\u0027 roles in other organizations in which they are not an admin. With fine-grained access control enabled, organization admins can list, add, remove and update users\u0027 roles in another organization, where they do not have organization admin role. All installations between v8.0 and v8.2.3 that have fine-grained access control beta enabled and more than one organization should be upgraded as soon as possible. If you cannot upgrade, you should turn off the fine-grained access control using a feature flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41244", "url": "https://www.suse.com/security/cve/CVE-2021-41244" }, { "category": "external", "summary": "SUSE Bug 1192763 for CVE-2021-41244", "url": "https://bugzilla.suse.com/1192763" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-10-20T11:40:04Z", "details": "critical" } ], "title": "CVE-2021-41244" }, { "cve": "CVE-2021-43798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43798" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `\u003cgrafana_host_url\u003e/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43798", "url": "https://www.suse.com/security/cve/CVE-2021-43798" }, { "category": "external", "summary": "SUSE Bug 1193492 for CVE-2021-43798", "url": "https://bugzilla.suse.com/1193492" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-10-20T11:40:04Z", "details": "important" } ], "title": "CVE-2021-43798" }, { "cve": "CVE-2021-43815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43815" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 has a directory traversal for arbitrary .csv files. It only affects instances that have the developer testing tool called TestData DB data source enabled and configured. The vulnerability is limited in scope, and only allows access to files with the extension .csv to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Versions 8.3.2 and 7.5.12 contain a patch for this issue. There is a workaround available for users who cannot upgrade. Running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43815", "url": "https://www.suse.com/security/cve/CVE-2021-43815" }, { "category": "external", "summary": "SUSE Bug 1193686 for CVE-2021-43815", "url": "https://bugzilla.suse.com/1193686" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-10-20T11:40:04Z", "details": "moderate" } ], "title": "CVE-2021-43815" }, { "cve": "CVE-2022-21673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21673" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions when a data source has the Forward OAuth Identity feature enabled, sending a query to that datasource with an API token (and no other user credentials) will forward the OAuth Identity of the most recently logged-in user. This can allow API token holders to retrieve data for which they may not have intended access. This attack relies on the Grafana instance having data sources that support the Forward OAuth Identity feature, the Grafana instance having a data source with the Forward OAuth Identity feature toggled on, the Grafana instance having OAuth enabled, and the Grafana instance having usable API keys. This issue has been patched in versions 7.5.13 and 8.3.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21673", "url": "https://www.suse.com/security/cve/CVE-2022-21673" }, { "category": "external", "summary": "SUSE Bug 1194873 for CVE-2022-21673", "url": "https://bugzilla.suse.com/1194873" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-10-20T11:40:04Z", "details": "moderate" } ], "title": "CVE-2022-21673" }, { "cve": "CVE-2022-21702", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21702" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site Scripting (XSS) attack. The attacker could either compromise an existing datasource for a specific Grafana instance or either set up its own public service and instruct anyone to set it up in their Grafana instance. To be impacted, all of the following must be applicable. For the data source proxy: A Grafana HTTP-based datasource configured with Server as Access Mode and a URL set, the attacker has to be in control of the HTTP server serving the URL of above datasource, and a specially crafted link pointing at the attacker controlled data source must be clicked on by an authenticated user. For the plugin proxy: A Grafana HTTP-based app plugin configured and enabled with a URL set, the attacker has to be in control of the HTTP server serving the URL of above app, and a specially crafted link pointing at the attacker controlled plugin must be clocked on by an authenticated user. For the backend plugin resource: An attacker must be able to navigate an authenticated user to a compromised plugin through a crafted link. Users are advised to update to a patched version. There are no known workarounds for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21702", "url": "https://www.suse.com/security/cve/CVE-2022-21702" }, { "category": "external", "summary": "SUSE Bug 1195726 for CVE-2022-21702", "url": "https://bugzilla.suse.com/1195726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-10-20T11:40:04Z", "details": "moderate" } ], "title": "CVE-2022-21702" }, { "cve": "CVE-2022-21703", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21703" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21703", "url": "https://www.suse.com/security/cve/CVE-2022-21703" }, { "category": "external", "summary": "SUSE Bug 1195727 for CVE-2022-21703", "url": "https://bugzilla.suse.com/1195727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-10-20T11:40:04Z", "details": "moderate" } ], "title": "CVE-2022-21703" }, { "cve": "CVE-2022-21713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21713" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Affected versions of Grafana expose multiple API endpoints which do not properly handle user authorization. `/teams/:teamId` will allow an authenticated attacker to view unintended data by querying for the specific team ID, `/teams/:search` will allow an authenticated attacker to search for teams and see the total number of available teams, including for those teams that the user does not have access to, and `/teams/:teamId/members` when editors_can_admin flag is enabled, an authenticated attacker can see unintended data by querying for the specific team ID. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21713", "url": "https://www.suse.com/security/cve/CVE-2022-21713" }, { "category": "external", "summary": "SUSE Bug 1195728 for CVE-2022-21713", "url": "https://bugzilla.suse.com/1195728" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-10-20T11:40:04Z", "details": "moderate" } ], "title": "CVE-2022-21713" }, { "cve": "CVE-2022-31097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-31097" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Versions on the 8.x and 9.x branch prior to 9.0.3, 8.5.9, 8.4.10, and 8.3.10 are vulnerable to stored cross-site scripting via the Unified Alerting feature of Grafana. An attacker can exploit this vulnerability to escalate privilege from editor to admin by tricking an authenticated admin to click on a link. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch. As a workaround, it is possible to disable alerting or use legacy alerting.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-31097", "url": "https://www.suse.com/security/cve/CVE-2022-31097" }, { "category": "external", "summary": "SUSE Bug 1201535 for CVE-2022-31097", "url": "https://bugzilla.suse.com/1201535" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-10-20T11:40:04Z", "details": "important" } ], "title": "CVE-2022-31097" }, { "cve": "CVE-2022-31107", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-31107" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user\u0027s external user id is not already associated with an account in Grafana, the malicious user\u0027s email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will be able to log in to the target user\u0027s Grafana account. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch for this issue. As a workaround, concerned users can disable OAuth login to their Grafana instance, or ensure that all users authorized to log in via OAuth have a corresponding user account in Grafana linked to their email address.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-31107", "url": "https://www.suse.com/security/cve/CVE-2022-31107" }, { "category": "external", "summary": "SUSE Bug 1201539 for CVE-2022-31107", "url": "https://bugzilla.suse.com/1201539" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-10-20T11:40:04Z", "details": "important" } ], "title": "CVE-2022-31107" }, { "cve": "CVE-2022-35957", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-35957" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Versions prior to 9.1.6 and 8.5.13 are vulnerable to an escalation from admin to server admin when auth proxy is used, allowing an admin to take over the server admin account and gain full control of the grafana instance. All installations should be upgraded as soon as possible. As a workaround deactivate auth proxy following the instructions at: https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/auth-proxy/", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-35957", "url": "https://www.suse.com/security/cve/CVE-2022-35957" }, { "category": "external", "summary": "SUSE Bug 1203597 for CVE-2022-35957", "url": "https://bugzilla.suse.com/1203597" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-10-20T11:40:04Z", "details": "moderate" } ], "title": "CVE-2022-35957" }, { "cve": "CVE-2022-36062", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-36062" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In versions prior to 8.5.13, 9.0.9, and 9.1.6, Grafana is subject to Improper Preservation of Permissions resulting in privilege escalation on some folders where Admin is the only used permission. The vulnerability impacts Grafana instances where RBAC was disabled and enabled afterwards, as the migrations which are translating legacy folder permissions to RBAC permissions do not account for the scenario where the only user permission in the folder is Admin, as a result RBAC adds permissions for Editors and Viewers which allow them to edit and view folders accordingly. This issue has been patched in versions 8.5.13, 9.0.9, and 9.1.6. A workaround when the impacted folder/dashboard is known is to remove the additional permissions manually.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-36062", "url": "https://www.suse.com/security/cve/CVE-2022-36062" }, { "category": "external", "summary": "SUSE Bug 1203596 for CVE-2022-36062", "url": "https://bugzilla.suse.com/1203596" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.aarch64", "SUSE Enterprise Storage 6:grafana-8.5.13-150100.3.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-10-20T11:40:04Z", "details": "moderate" } ], "title": "CVE-2022-36062" } ] }
wid-sec-w-2022-0302
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0302 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0302.json" }, { "category": "self", "summary": "WID-SEC-2022-0302 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0302" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04", "url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "Xerox Security Bulletin XRX22-015", "url": "https://security.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-015-FreeFlow-Print-Server-v7.pdf" }, { "category": "external", "summary": "Xerox Security Bulletin XRX22-013 vom 2022-06-14", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-013-FreeFlow-Print-Server-v9.pdf" }, { "category": "external", "summary": "Xerox Security Bulletin XRX22-012 vom 2022-06-14", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-012-FreeFlow-Printer.pdf" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen erm\u00f6glichen Ausf\u00fchren von beliebigem Programmcode mit Administratorrechten", "tracking": { "current_release_date": "2023-04-03T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:27:55.136+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-0302", "initial_release_date": "2022-06-14T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-14T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-06-21T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2023-04-03T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server 7", "product": { "name": "Xerox FreeFlow Print Server 7", "product_id": "T000872", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:7" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server 9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2124", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2016-2124" }, { "cve": "CVE-2019-14822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2019-14822" }, { "cve": "CVE-2019-19906", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2019-19906" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-17049", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2020-17049" }, { "cve": "CVE-2020-25717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2020-25717" }, { "cve": "CVE-2020-25718", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2020-25718" }, { "cve": "CVE-2020-25719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2020-25719" }, { "cve": "CVE-2020-25721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2020-25721" }, { "cve": "CVE-2020-25722", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2020-25722" }, { "cve": "CVE-2020-9484", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2020-9484" }, { "cve": "CVE-2021-21707", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-21707" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-23192", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-23192" }, { "cve": "CVE-2021-27815", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-27815" }, { "cve": "CVE-2021-30846", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-30846" }, { "cve": "CVE-2021-30848", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-30848" }, { "cve": "CVE-2021-30849", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-30849" }, { "cve": "CVE-2021-30851", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-30851" }, { "cve": "CVE-2021-30858", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-30858" }, { "cve": "CVE-2021-33430", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-33430" }, { "cve": "CVE-2021-34141", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-34141" }, { "cve": "CVE-2021-35604", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-35604" }, { "cve": "CVE-2021-35624", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-35624" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3733", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-3733" }, { "cve": "CVE-2021-3737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-3737" }, { "cve": "CVE-2021-3738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-3738" }, { "cve": "CVE-2021-3770", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-3770" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-38115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-38115" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-39212", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-39212" }, { "cve": "CVE-2021-39272", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-39272" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-39920", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-39920" }, { "cve": "CVE-2021-39921", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-39921" }, { "cve": "CVE-2021-39922", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-39922" }, { "cve": "CVE-2021-39923", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-39923" }, { "cve": "CVE-2021-39924", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-39924" }, { "cve": "CVE-2021-39925", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-39925" }, { "cve": "CVE-2021-39926", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-39926" }, { "cve": "CVE-2021-39928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-39928" }, { "cve": "CVE-2021-39929", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-39929" }, { "cve": "CVE-2021-4008", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-4008" }, { "cve": "CVE-2021-4009", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-4009" }, { "cve": "CVE-2021-4010", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-4010" }, { "cve": "CVE-2021-4011", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-4011" }, { "cve": "CVE-2021-40145", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-40145" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4034", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-4034" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-40812", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-40812" }, { "cve": "CVE-2021-41133", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-41133" }, { "cve": "CVE-2021-4140", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-4140" }, { "cve": "CVE-2021-41495", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-41495" }, { "cve": "CVE-2021-41496", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-41496" }, { "cve": "CVE-2021-4160", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-4160" }, { "cve": "CVE-2021-4181", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-4181" }, { "cve": "CVE-2021-41817", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-41817" }, { "cve": "CVE-2021-41819", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-41819" }, { "cve": "CVE-2021-4182", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-4182" }, { "cve": "CVE-2021-4183", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-4183" }, { "cve": "CVE-2021-4184", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-4184" }, { "cve": "CVE-2021-4185", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-4185" }, { "cve": "CVE-2021-42717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-42717" }, { "cve": "CVE-2021-42762", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-42762" }, { "cve": "CVE-2021-43331", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-43331" }, { "cve": "CVE-2021-43332", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-43332" }, { "cve": "CVE-2021-43395", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-43395" }, { "cve": "CVE-2021-43527", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-43527" }, { "cve": "CVE-2021-43528", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-43528" }, { "cve": "CVE-2021-43536", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-43536" }, { "cve": "CVE-2021-43537", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-43537" }, { "cve": "CVE-2021-43538", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-43538" }, { "cve": "CVE-2021-43539", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-43539" }, { "cve": "CVE-2021-43541", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-43541" }, { "cve": "CVE-2021-43542", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-43542" }, { "cve": "CVE-2021-43543", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-43543" }, { "cve": "CVE-2021-43545", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-43545" }, { "cve": "CVE-2021-43546", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-43546" }, { "cve": "CVE-2021-43566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-43566" }, { "cve": "CVE-2021-43818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-43818" }, { "cve": "CVE-2021-44142", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-44142" }, { "cve": "CVE-2021-44224", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-44224" }, { "cve": "CVE-2021-44227", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-44227" }, { "cve": "CVE-2021-44420", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-44420" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44540", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-44540" }, { "cve": "CVE-2021-44541", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-44541" }, { "cve": "CVE-2021-44542", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-44542" }, { "cve": "CVE-2021-44543", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-44543" }, { "cve": "CVE-2021-44790", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-44790" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-45115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-45115" }, { "cve": "CVE-2021-45116", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-45116" }, { "cve": "CVE-2021-45452", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-45452" }, { "cve": "CVE-2021-45960", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-45960" }, { "cve": "CVE-2021-46143", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2021-46143" }, { "cve": "CVE-2022-0336", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-0336" }, { "cve": "CVE-2022-0391", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-0391" }, { "cve": "CVE-2022-0566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-0566" }, { "cve": "CVE-2022-0581", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-0581" }, { "cve": "CVE-2022-0582", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-0582" }, { "cve": "CVE-2022-0583", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-0583" }, { "cve": "CVE-2022-0585", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-0585" }, { "cve": "CVE-2022-0586", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-0586" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-21248", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21248" }, { "cve": "CVE-2022-21263", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21263" }, { "cve": "CVE-2022-21271", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21271" }, { "cve": "CVE-2022-21282", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21282" }, { "cve": "CVE-2022-21291", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21291" }, { "cve": "CVE-2022-21293", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21293" }, { "cve": "CVE-2022-21294", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21294" }, { "cve": "CVE-2022-21296", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21296" }, { "cve": "CVE-2022-21298", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21298" }, { "cve": "CVE-2022-21299", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21299" }, { "cve": "CVE-2022-21305", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21305" }, { "cve": "CVE-2022-21340", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21340" }, { "cve": "CVE-2022-21341", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21341" }, { "cve": "CVE-2022-21349", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21349" }, { "cve": "CVE-2022-21360", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21360" }, { "cve": "CVE-2022-21365", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21365" }, { "cve": "CVE-2022-21375", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21375" }, { "cve": "CVE-2022-21384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21384" }, { "cve": "CVE-2022-21416", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21416" }, { "cve": "CVE-2022-21446", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21446" }, { "cve": "CVE-2022-21461", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21461" }, { "cve": "CVE-2022-21463", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21463" }, { "cve": "CVE-2022-21493", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21493" }, { "cve": "CVE-2022-21494", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21494" }, { "cve": "CVE-2022-21712", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21712" }, { "cve": "CVE-2022-21716", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21716" }, { "cve": "CVE-2022-21824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-21824" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22737" }, { "cve": "CVE-2022-22738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22738" }, { "cve": "CVE-2022-22739", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22739" }, { "cve": "CVE-2022-22740", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22740" }, { "cve": "CVE-2022-22741", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22741" }, { "cve": "CVE-2022-22742", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22742" }, { "cve": "CVE-2022-22743", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22743" }, { "cve": "CVE-2022-22744", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22744" }, { "cve": "CVE-2022-22745", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22745" }, { "cve": "CVE-2022-22746", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22746" }, { "cve": "CVE-2022-22747", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22747" }, { "cve": "CVE-2022-22748", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22748" }, { "cve": "CVE-2022-22751", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22751" }, { "cve": "CVE-2022-22753", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22753" }, { "cve": "CVE-2022-22754", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22754" }, { "cve": "CVE-2022-22756", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22756" }, { "cve": "CVE-2022-22759", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22759" }, { "cve": "CVE-2022-22760", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22760" }, { "cve": "CVE-2022-22761", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22761" }, { "cve": "CVE-2022-22763", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22763" }, { "cve": "CVE-2022-22764", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22764" }, { "cve": "CVE-2022-22815", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22815" }, { "cve": "CVE-2022-22816", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22816" }, { "cve": "CVE-2022-22817", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22817" }, { "cve": "CVE-2022-22818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22818" }, { "cve": "CVE-2022-22822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22824" }, { "cve": "CVE-2022-22825", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22825" }, { "cve": "CVE-2022-22826", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22826" }, { "cve": "CVE-2022-22827", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-22827" }, { "cve": "CVE-2022-23181", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-23181" }, { "cve": "CVE-2022-23833", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-23833" }, { "cve": "CVE-2022-23852", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23943", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-23943" }, { "cve": "CVE-2022-23990", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-23990" }, { "cve": "CVE-2022-24407", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-24407" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25313", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25314", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-25314" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-26381", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-26381" }, { "cve": "CVE-2022-26383", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-26383" }, { "cve": "CVE-2022-26384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-26384" }, { "cve": "CVE-2022-26386", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-26386" }, { "cve": "CVE-2022-26387", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-26387" }, { "cve": "CVE-2022-26485", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-26485" }, { "cve": "CVE-2022-26486", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00.000+00:00", "title": "CVE-2022-26486" } ] }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-27T23:00:00.000+00:00", "generator": { "date": "2024-11-28T11:39:04.623+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-11-27T23:00:00.000+00:00", "number": "2", "summary": "Produktzuordnung \u00fcberpr\u00fcft" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c3.8.1.0", "product": { "name": "Dell ECS \u003c3.8.1.0", "product_id": "T033919" } }, { "category": "product_version", "name": "3.8.1.0", "product": { "name": "Dell ECS 3.8.1.0", "product_id": "T033919-fixed", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2024-21626" } ] }
wid-sec-w-2022-0400
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "OpenSSL ist eine im Quelltext frei verf\u00fcgbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in OpenSSL ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Appliance\n- F5 Networks\n- Hardware Appliance\n- Linux\n- MacOS X\n- NetApp Appliance\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0400 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0400.json" }, { "category": "self", "summary": "WID-SEC-2022-0400 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0400" }, { "category": "external", "summary": "OpenSSL Security Advisory vom 2021-08-24", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "category": "external", "summary": "Debian Security Advisory vom 2021-08-24", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "category": "external", "summary": "Ubuntu Security Notice vom 2021-08-24", "url": "https://ubuntu.com/security/notices/USN-5051-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2825-1 vom 2021-08-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009342.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2830-1 vom 2021-08-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009341.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2831-1 vom 2021-08-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009340.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:14791-1 vom 2021-08-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009339.html" }, { "category": "external", "summary": "FreeBSD Security Advisory FREEBSD-SA-21:16.OPENSSL vom 2021-08-24", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:16.openssl.asc" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2833-1 vom 2021-08-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009346.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2826-1 vom 2021-08-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009345.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2827-1 vom 2021-08-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009344.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2829-1 vom 2021-08-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009343.html" }, { "category": "external", "summary": "FreeBSD Security Advisory FREEBSD-SA-21:16.OPENSSL vom 2021-08-24", "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-21:16.openssl.asc" }, { "category": "external", "summary": "Synology Security Advisory SYNOLOGY-SA-21:24 vom 2021-08-26", "url": "https://www.synology.com/en-global/support/security/Synology_SA_21_24" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5051-2 vom 2021-08-26", "url": "https://ubuntu.com/security/notices/USN-5051-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5051-3 vom 2021-08-26", "url": "https://ubuntu.com/security/notices/USN-5051-3" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20210827-0010 vom 2021-08-27", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2852-1 vom 2021-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009363.html" }, { "category": "external", "summary": "QNAP Security Advisory QSA-21-39 vom 2021-08-30", "url": "https://www.qnap.com/de-de/security-advisory/QSA-21-39" }, { "category": "external", "summary": "QNAP Security Advisory QSA-21-40 vom 2021-08-30", "url": "https://www.qnap.com/de-de/security-advisory/QSA-21-40" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5051-4 vom 2021-09-01", "url": "https://ubuntu.com/security/notices/USN-5051-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2966-1 vom 2021-09-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009420.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2967-1 vom 2021-09-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009418.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2968-1 vom 2021-09-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009417.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2996-1 vom 2021-09-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009425.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2995-1 vom 2021-09-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009423.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2994-1 vom 2021-09-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009429.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:3019-1 vom 2021-09-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009433.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:14801-1 vom 2021-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009466.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:14802-1 vom 2021-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009465.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:3144-1 vom 2021-09-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009467.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2966-2 vom 2021-09-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009478.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5088-1 vom 2021-09-23", "url": "https://ubuntu.com/security/notices/USN-5088-1" }, { "category": "external", "summary": "F5 Security Advisory K19559038 vom 2021-10-01", "url": "https://support.f5.com/csp/article/K19559038" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2021-1541 vom 2021-10-05", "url": "https://alas.aws.amazon.com/ALAS-2021-1541.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2021-1714 vom 2021-10-07", "url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1714.html" }, { "category": "external", "summary": "HPE Security Bulletin HPESBNS04202 vom 2021-10-07", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbns04202en_us" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2021-1721 vom 2021-11-04", "url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1721.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4614 vom 2021-11-10", "url": "https://access.redhat.com/errata/RHSA-2021:4614" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4613 vom 2021-11-10", "url": "https://access.redhat.com/errata/RHSA-2021:4613" }, { "category": "external", "summary": "Meinberg Security Advisory MBGSA-2021.03 vom 2021-11-15", "url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2021-03-meinberg-lantime-firmware-v7-04-008-und-v6-24-029.htm" }, { "category": "external", "summary": "IBM Security Bulletin 6526078 vom 2021-12-15", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-openssl-affect-ibm-integration-bus-cve-2021-3712/" }, { "category": "external", "summary": "HPE Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?elq_mid=17739\u0026elq_cid=67018031\u0026docId=hpesbhf04211en_us" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:5226 vom 2021-12-21", "url": "https://access.redhat.com/errata/RHSA-2021:5226" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-5226 vom 2021-12-22", "url": "http://linux.oracle.com/errata/ELSA-2021-5226.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9632 vom 2021-12-23", "url": "https://linux.oracle.com/errata/ELSA-2021-9632.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0015 vom 2022-01-04", "url": "https://access.redhat.com/errata/RHSA-2022:0015" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2022-02 vom 2022-01-06", "url": "https://de.tenable.com/security/tns-2022-02" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0034 vom 2022-01-05", "url": "https://access.redhat.com/errata/RHSA-2022:0034" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0043 vom 2022-01-10", "url": "https://access.redhat.com/errata/RHSA-2022:0043" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0042 vom 2022-01-10", "url": "https://access.redhat.com/errata/RHSA-2022:0042" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0044 vom 2022-01-10", "url": "https://access.redhat.com/errata/RHSA-2022:0044" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0047 vom 2022-01-10", "url": "https://access.redhat.com/errata/RHSA-2022:0047" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0064 vom 2022-01-11", "url": "https://access.redhat.com/errata/RHSA-2022:0064" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-0064 vom 2022-01-12", "url": "http://linux.oracle.com/errata/ELSA-2022-0064.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9017 vom 2022-01-13", "url": "https://linux.oracle.com/errata/ELSA-2022-9017.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9023 vom 2022-01-14", "url": "https://linux.oracle.com/errata/ELSA-2022-9023.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0163 vom 2022-01-18", "url": "https://access.redhat.com/errata/RHSA-2022:0163" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-004 vom 2022-01-19", "url": "https://downloads.avaya.com/css/P8/documents/101079950" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0318 vom 2022-01-27", "url": "https://access.redhat.com/errata/RHSA-2022:0318" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0434 vom 2022-02-04", "url": "https://access.redhat.com/errata/RHSA-2022:0434" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0431 vom 2022-02-03", "url": "https://access.redhat.com/errata/RHSA-2022:0431" }, { "category": "external", "summary": "SIEMENS Security Advisory SSA-244969 vom 2022-02-08", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0476 vom 2022-02-09", "url": "https://access.redhat.com/errata/RHSA-2022:0476" }, { "category": "external", "summary": "HPE Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?elq_mid=17739\u0026elq_cid=67018031\u0026docId=hpesbhf04251en_us" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-002 vom 2022-02-03", "url": "https://downloads.avaya.com/css/P8/documents/101080403" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0751-1 vom 2022-03-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010387.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0856 vom 2022-03-14", "url": "https://access.redhat.com/errata/RHSA-2022:0856" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9225 vom 2022-03-18", "url": "https://linux.oracle.com/errata/ELSA-2022-9225.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1051 vom 2022-03-24", "url": "https://access.redhat.com/errata/RHSA-2022:1051" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0577 vom 2022-03-28", "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1396-1 vom 2022-04-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010822.html" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2022-10 vom 2022-05-10", "url": "http://www.auscert.org.au/bulletins/ESB-2022.2191" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2022-10 vom 2022-05-10 vom 2022-05-09", "url": "https://www.tenable.com/security/tns-2022-10" }, { "category": "external", "summary": "HPE Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbux04309en_us\u0026hprpt_id=ALERT_HPE_3024068\u0026jumpid=em_pom8nu6hj_aid-520066529" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2134-1 vom 2022-06-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011316.html" }, { "category": "external", "summary": "HPE SECURITY BULLETIN HPESBST04367 rev.1 vom 2022-09-21", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04367en_us" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202210-02 vom 2022-10-16", "url": "https://security.gentoo.org/glsa/202210-02" }, { "category": "external", "summary": "Trellix Knowledge Center", "url": "https://kcm.trellix.com/corporate/index?page=content\u0026id=SB10366" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:4428-1 vom 2022-12-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013218.html" }, { "category": "external", "summary": "Hitachi Cybersecurity Advisory vom 2023-04-25", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-143-02" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2023-126 vom 2023-07-18", "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-126/index.html" }, { "category": "external", "summary": "Hitachi Energy Cybersecurity Advisory vom 2023-08-29", "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153-CSAF\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "external", "summary": "F5 Security Advisory K19559038 vom 2023-10-12", "url": "https://my.f5.com/manage/s/article/K19559038" }, { "category": "external", "summary": "IBM Security Bulletin 7063708 vom 2023-10-31", "url": "https://www.ibm.com/support/pages/node/7063708" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-32790 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-32790.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-13026 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-13026.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-13027 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-13027.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-13024 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-13024.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-13025 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-13025.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-32791 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-32791.html" }, { "category": "external", "summary": "IBM Security Bulletin 7108821 vom 2024-01-17", "url": "https://www.ibm.com/support/pages/node/7108821" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0191-1 vom 2024-01-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" }, { "category": "external", "summary": "Dell Knowledge Base Article", "url": "https://www.dell.com/support/kbdoc/en-us/000221474/dsa-2024-059-security-update-for-dell-networker-multiple-components-vulnerabilities" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2502 vom 2024-03-19", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2502.html" }, { "category": "external", "summary": "SolarWinds Platform 2024.2 release notes vom 2024-06-04", "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2024-2_release_notes.htm" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12408 vom 2024-06-05", "url": "https://linux.oracle.com/errata/ELSA-2024-12408.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-250 vom 2024-06-27", "url": "https://www.dell.com/support/kbdoc/de-de/000226426/dsa-2024-250-security-update-for-dell-avamar-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12842 vom 2024-11-25", "url": "https://linux.oracle.com/errata/ELSA-2024-12842.html" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:15136-1 vom 2025-05-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/J2QBML6L7L5D24KOH62TTXXD5XXJHMEM/" }, { "category": "external", "summary": "HPE Security Advisory vom 2025-05-22", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbns04859en_us\u0026docLocale=en_US" } ], "source_lang": "en-US", "title": "OpenSSL: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2025-05-22T22:00:00.000+00:00", "generator": { "date": "2025-05-23T07:55:05.869+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2022-0400", "initial_release_date": "2021-08-24T22:00:00.000+00:00", "revision_history": [ { "date": "2021-08-24T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2021-08-25T22:00:00.000+00:00", "number": "2", "summary": "Neue Informationen von Synology aufgenommen" }, { "date": "2021-08-26T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2021-08-29T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-09-01T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2021-09-07T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-09-09T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-09-13T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-09-19T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-09-20T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-09-21T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-09-23T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2021-10-03T22:00:00.000+00:00", "number": "13", "summary": "Neue Informationen von F5 aufgenommen" }, { "date": "2021-10-04T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2021-10-06T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2021-10-07T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2021-11-04T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2021-11-10T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-11-14T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Meinberg aufgenommen" }, { "date": "2021-12-14T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2021-12-15T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2021-12-21T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2021-12-23T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-01-04T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-05T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Tenable und Red Hat aufgenommen" }, { "date": "2022-01-09T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-10T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-11T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2022-01-12T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-01-13T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-01-18T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-27T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von AVAYA und Red Hat aufgenommen" }, { "date": "2022-02-03T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-07T23:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Siemens aufgenommen" }, { "date": "2022-02-08T23:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-17T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2022-03-02T23:00:00.000+00:00", "number": "37", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2022-03-08T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-03-14T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-03-20T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-03-24T23:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-03-28T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-25T22:00:00.000+00:00", "number": "43", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-05-09T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von Tenable aufgenommen" }, { "date": "2022-05-22T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2022-06-20T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-20T22:00:00.000+00:00", "number": "47", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2022-10-16T22:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2022-10-30T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates aufgenommen" }, { "date": "2022-12-12T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-05-23T22:00:00.000+00:00", "number": "51", "summary": "Neue Updates aufgenommen" }, { "date": "2023-07-17T22:00:00.000+00:00", "number": "52", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2023-07-18T22:00:00.000+00:00", "number": "53", "summary": "Hitachi Produkte erg\u00e4nzt." }, { "date": "2023-08-28T22:00:00.000+00:00", "number": "54", "summary": "Neue Updates aufgenommen" }, { "date": "2023-10-11T22:00:00.000+00:00", "number": "55", "summary": "Neue Updates aufgenommen" }, { "date": "2023-10-31T23:00:00.000+00:00", "number": "56", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-12-07T23:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-01-17T23:00:00.000+00:00", "number": "58", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-01-25T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-03-18T23:00:00.000+00:00", "number": "61", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-06-03T22:00:00.000+00:00", "number": "62", "summary": "Neue Updates aufgenommen" }, { "date": "2024-06-04T22:00:00.000+00:00", "number": "63", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-06-26T22:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-11-25T23:00:00.000+00:00", "number": "65", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-05-21T22:00:00.000+00:00", "number": "66", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2025-05-22T22:00:00.000+00:00", "number": "67", "summary": "Neue Updates von HP aufgenommen" } ], "status": "final", "version": "67" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } }, { "category": "product_name", "name": "Avaya Web License Manager", "product": { "name": "Avaya Web License Manager", "product_id": "T016243", "product_identification_helper": { "cpe": "cpe:/a:avaya:web_license_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c19.10", "product": { "name": "Dell NetWorker \u003c19.10", "product_id": "T032354" } }, { "category": "product_version", "name": "19.1", "product": { "name": "Dell NetWorker 19.10", "product_id": "T032354-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:19.10" } } } ], "category": "product_name", "name": "NetWorker" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "EMC Avamar", "product": { "name": "EMC Avamar", "product_id": "T014381", "product_identification_helper": { "cpe": "cpe:/a:emc:avamar:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } }, { "category": "product_version_range", "name": "\u003c16.1.3.1", "product": { "name": "F5 BIG-IP \u003c16.1.3.1", "product_id": "T025082" } }, { "category": "product_version", "name": "16.1.3.1", "product": { "name": "F5 BIG-IP 16.1.3.1", "product_id": "T025082-fixed", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:16.1.3.1" } } }, { "category": "product_version_range", "name": "\u003c15.1.6.1", "product": { "name": "F5 BIG-IP \u003c15.1.6.1", "product_id": "T025089" } }, { "category": "product_version", "name": "15.1.6.1", "product": { "name": "F5 BIG-IP 15.1.6.1", "product_id": "T025089-fixed", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:15.1.6.1" } } }, { "category": "product_version_range", "name": "\u003c17.0.0", "product": { "name": "F5 BIG-IP \u003c17.0.0", "product_id": "T025350" } }, { "category": "product_version", "name": "17.0.0", "product": { "name": "F5 BIG-IP 17.0.0", "product_id": "T025350-fixed", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:17.0.0" } } } ], "category": "product_name", "name": "BIG-IP" } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "FreeBSD Project FreeBSD OS", "product": { "name": "FreeBSD Project FreeBSD OS", "product_id": "4035", "product_identification_helper": { "cpe": "cpe:/o:freebsd:freebsd:-" } } } ], "category": "vendor", "name": "FreeBSD Project" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "HPE Fabric OS", "product": { "name": "HPE Fabric OS", "product_id": "T019403", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:-" } } }, { "category": "product_name", "name": "HPE HP-UX", "product": { "name": "HPE HP-UX", "product_id": "4871", "product_identification_helper": { "cpe": "cpe:/o:hp:hp-ux:-" } } }, { "category": "product_name", "name": "HPE NonStop Server", "product": { "name": "HPE NonStop Server", "product_id": "4918", "product_identification_helper": { "cpe": "cpe:/h:hp:nonstop_server:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "category": "product_name", "name": "Hitachi Command Suite", "product": { "name": "Hitachi Command Suite", "product_id": "T010951", "product_identification_helper": { "cpe": "cpe:/a:hitachi:command_suite:-" } } }, { "category": "product_name", "name": "Hitachi Configuration Manager", "product": { "name": "Hitachi Configuration Manager", "product_id": "T020304", "product_identification_helper": { "cpe": "cpe:/a:hitachi:configuration_manager:-" } } }, { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "category": "product_name", "name": "Hitachi Energy RTU500", "product": { "name": "Hitachi Energy RTU500", "product_id": "T027844", "product_identification_helper": { "cpe": "cpe:/h:abb:rtu500:-" } } } ], "category": "vendor", "name": "Hitachi Energy" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c8.0.0.24", "product": { "name": "IBM Rational Build Forge \u003c8.0.0.24", "product_id": "T030689" } }, { "category": "product_version", "name": "8.0.0.24", "product": { "name": "IBM Rational Build Forge 8.0.0.24", "product_id": "T030689-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_build_forge:8.0.0.24" } } } ], "category": "product_name", "name": "Rational Build Forge" }, { "branches": [ { "category": "product_version", "name": "10.0.0.0-10.0.6.1", "product": { "name": "IBM Security Verify Access 10.0.0.0-10.0.6.1", "product_id": "T031895", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:10.0.0.0_-_10.0.6.1" } } } ], "category": "product_name", "name": "Security Verify Access" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.04.008", "product": { "name": "Meinberg LANTIME \u003c7.04.008", "product_id": "T021044" } }, { "category": "product_version", "name": "7.04.008", "product": { "name": "Meinberg LANTIME 7.04.008", "product_id": "T021044-fixed", "product_identification_helper": { "cpe": "cpe:/h:meinberg:lantime:7.04.008" } } }, { "category": "product_version_range", "name": "\u003c6.24.029", "product": { "name": "Meinberg LANTIME \u003c6.24.029", "product_id": "T021045" } }, { "category": "product_version", "name": "6.24.029", "product": { "name": "Meinberg LANTIME 6.24.029", "product_id": "T021045-fixed", "product_identification_helper": { "cpe": "cpe:/h:meinberg:lantime:6.24.029" } } } ], "category": "product_name", "name": "LANTIME" } ], "category": "vendor", "name": "Meinberg" }, { "branches": [ { "category": "product_name", "name": "NetApp Data ONTAP", "product": { "name": "NetApp Data ONTAP", "product_id": "7654", "product_identification_helper": { "cpe": "cpe:/a:netapp:data_ontap:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c1.1.1", "product": { "name": "Open Source OpenSSL \u003c1.1.1", "product_id": "402226" } }, { "category": "product_version", "name": "1.1.1", "product": { "name": "Open Source OpenSSL 1.1.1", "product_id": "402226-fixed", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:1.1.1" } } }, { "category": "product_version_range", "name": "\u003c1.1.1l", "product": { "name": "Open Source OpenSSL \u003c1.1.1l", "product_id": "T020216" } }, { "category": "product_version", "name": "1.1.1l", "product": { "name": "Open Source OpenSSL 1.1.1l", "product_id": "T020216-fixed", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:1.1.1l" } } } ], "category": "product_name", "name": "OpenSSL" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "QNAP NAS", "product": { "name": "QNAP NAS", "product_id": "T017100", "product_identification_helper": { "cpe": "cpe:/h:qnap:nas:-" } } } ], "category": "vendor", "name": "QNAP" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "1200", "product": { "name": "Siemens SIMATIC S7 1200", "product_id": "T019435", "product_identification_helper": { "cpe": "cpe:/h:siemens:simatic_s7:1200" } } } ], "category": "product_name", "name": "SIMATIC S7" } ], "category": "vendor", "name": "Siemens" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2024.2", "product": { "name": "SolarWinds Platform \u003c2024.2", "product_id": "T035149" } }, { "category": "product_version", "name": "2024.2", "product": { "name": "SolarWinds Platform 2024.2", "product_id": "T035149-fixed", "product_identification_helper": { "cpe": "cpe:/a:solarwinds:orion_platform:2024.2" } } } ], "category": "product_name", "name": "Platform" } ], "category": "vendor", "name": "SolarWinds" }, { "branches": [ { "category": "product_name", "name": "Synology DiskStation Manager", "product": { "name": "Synology DiskStation Manager", "product_id": "450918", "product_identification_helper": { "cpe": "cpe:/a:synology:diskstation_manager:-" } } } ], "category": "vendor", "name": "Synology" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Tenable Security Nessus Network Monitor", "product": { "name": "Tenable Security Nessus Network Monitor", "product_id": "T016632", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus_network_monitor:-" } } }, { "category": "product_version_range", "name": "\u003c6.0.1", "product": { "name": "Tenable Security Nessus Network Monitor \u003c6.0.1", "product_id": "T023141" } }, { "category": "product_version", "name": "6.0.1", "product": { "name": "Tenable Security Nessus Network Monitor 6.0.1", "product_id": "T023141-fixed", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus_network_monitor:6.0.1" } } } ], "category": "product_name", "name": "Nessus Network Monitor" } ], "category": "vendor", "name": "Tenable Security" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c5.10 CU 11", "product": { "name": "Trellix ePolicy Orchestrator \u003c5.10 CU 11", "product_id": "T024888" } }, { "category": "product_version", "name": "5.10 CU 11", "product": { "name": "Trellix ePolicy Orchestrator 5.10 CU 11", "product_id": "T024888-fixed", "product_identification_helper": { "cpe": "cpe:/a:trellix:epolicy_orchestrator:5.10_update_14" } } } ], "category": "product_name", "name": "ePolicy Orchestrator" } ], "category": "vendor", "name": "Trellix" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3711", "product_status": { "known_affected": [ "T025350", "T031895", "67646", "4035", "4871", "T010951", "T030689", "T015127", "T015126", "T016632", "T004914", "450918", "T019435", "T020304", "T024888", "T001663", "398363", "T015519", "T015518", "T035149", "T015516", "T025082", "7654", "T012167", "T032354", "T016243", "T017100", "T017562", "T019403", "T014381", "4918", "2951", "T002207", "T000126", "T020216", "402226", "T027843", "T027844", "T021045", "T023141", "T021044", "T025089" ] }, "release_date": "2021-08-24T22:00:00.000+00:00", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "product_status": { "known_affected": [ "T025350", "T031895", "67646", "4035", "4871", "T010951", "T030689", "T015127", "T015126", "T016632", "T004914", "450918", "T019435", "T020304", "T024888", "T001663", "398363", "T015519", "T015518", "T035149", "T015516", "T025082", "7654", "T012167", "T032354", "T016243", "T017100", "T017562", "T019403", "T014381", "4918", "2951", "T002207", "T000126", "T020216", "402226", "T027843", "T027844", "T021045", "T023141", "T021044", "T025089" ] }, "release_date": "2021-08-24T22:00:00.000+00:00", "title": "CVE-2021-3712" } ] }
wid-sec-w-2022-0432
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0432 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0432.json" }, { "category": "self", "summary": "WID-SEC-2022-0432 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0432" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04", "url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "Xerox Mini Bulletin XRX21A vom 2022-06-21", "url": "https://security.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-014-FreeFlow-Print-Server-v9.pdf" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-04-03T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:29:02.928+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-0432", "initial_release_date": "2022-06-21T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-21T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server 9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server v9", "product": { "name": "Xerox FreeFlow Print Server v9", "product_id": "T015632", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2124", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2016-2124" }, { "cve": "CVE-2019-14822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2019-14822" }, { "cve": "CVE-2019-19906", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2019-19906" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-17049", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2020-17049" }, { "cve": "CVE-2020-25717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2020-25717" }, { "cve": "CVE-2020-25718", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2020-25718" }, { "cve": "CVE-2020-25719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2020-25719" }, { "cve": "CVE-2020-25721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2020-25721" }, { "cve": "CVE-2020-25722", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2020-25722" }, { "cve": "CVE-2020-9484", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2020-9484" }, { "cve": "CVE-2021-21707", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-21707" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-23192", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-23192" }, { "cve": "CVE-2021-27815", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-27815" }, { "cve": "CVE-2021-30846", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-30846" }, { "cve": "CVE-2021-30848", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-30848" }, { "cve": "CVE-2021-30849", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-30849" }, { "cve": "CVE-2021-30851", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-30851" }, { "cve": "CVE-2021-30858", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-30858" }, { "cve": "CVE-2021-33430", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-33430" }, { "cve": "CVE-2021-34141", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-34141" }, { "cve": "CVE-2021-35604", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-35604" }, { "cve": "CVE-2021-35624", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-35624" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3733", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-3733" }, { "cve": "CVE-2021-3737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-3737" }, { "cve": "CVE-2021-3738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-3738" }, { "cve": "CVE-2021-3770", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-3770" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-38115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-38115" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-39212", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-39212" }, { "cve": "CVE-2021-39272", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-39272" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-39920", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-39920" }, { "cve": "CVE-2021-39921", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-39921" }, { "cve": "CVE-2021-39922", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-39922" }, { "cve": "CVE-2021-39923", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-39923" }, { "cve": "CVE-2021-39924", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-39924" }, { "cve": "CVE-2021-39925", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-39925" }, { "cve": "CVE-2021-39926", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-39926" }, { "cve": "CVE-2021-39928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-39928" }, { "cve": "CVE-2021-39929", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-39929" }, { "cve": "CVE-2021-4008", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-4008" }, { "cve": "CVE-2021-4009", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-4009" }, { "cve": "CVE-2021-4010", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-4010" }, { "cve": "CVE-2021-4011", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-4011" }, { "cve": "CVE-2021-40145", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-40145" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4034", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-4034" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-40812", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-40812" }, { "cve": "CVE-2021-41133", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-41133" }, { "cve": "CVE-2021-4140", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-4140" }, { "cve": "CVE-2021-41495", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-41495" }, { "cve": "CVE-2021-41496", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-41496" }, { "cve": "CVE-2021-4181", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-4181" }, { "cve": "CVE-2021-41817", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-41817" }, { "cve": "CVE-2021-41819", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-41819" }, { "cve": "CVE-2021-4182", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-4182" }, { "cve": "CVE-2021-4183", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-4183" }, { "cve": "CVE-2021-4184", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-4184" }, { "cve": "CVE-2021-4185", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-4185" }, { "cve": "CVE-2021-42717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-42717" }, { "cve": "CVE-2021-42762", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-42762" }, { "cve": "CVE-2021-43331", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-43331" }, { "cve": "CVE-2021-43332", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-43332" }, { "cve": "CVE-2021-43395", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-43395" }, { "cve": "CVE-2021-43527", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-43527" }, { "cve": "CVE-2021-43528", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-43528" }, { "cve": "CVE-2021-43536", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-43536" }, { "cve": "CVE-2021-43537", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-43537" }, { "cve": "CVE-2021-43538", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-43538" }, { "cve": "CVE-2021-43539", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-43539" }, { "cve": "CVE-2021-43541", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-43541" }, { "cve": "CVE-2021-43542", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-43542" }, { "cve": "CVE-2021-43543", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-43543" }, { "cve": "CVE-2021-43545", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-43545" }, { "cve": "CVE-2021-43546", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-43546" }, { "cve": "CVE-2021-43566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-43566" }, { "cve": "CVE-2021-43818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-43818" }, { "cve": "CVE-2021-44142", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-44142" }, { "cve": "CVE-2021-44224", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-44224" }, { "cve": "CVE-2021-44227", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-44227" }, { "cve": "CVE-2021-44420", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-44420" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44540", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-44540" }, { "cve": "CVE-2021-44541", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-44541" }, { "cve": "CVE-2021-44542", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-44542" }, { "cve": "CVE-2021-44543", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-44543" }, { "cve": "CVE-2021-44790", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-44790" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-45115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-45115" }, { "cve": "CVE-2021-45116", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-45116" }, { "cve": "CVE-2021-45452", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-45452" }, { "cve": "CVE-2021-45960", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-45960" }, { "cve": "CVE-2021-46143", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2021-46143" }, { "cve": "CVE-2022-0336", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-0336" }, { "cve": "CVE-2022-0391", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-0391" }, { "cve": "CVE-2022-0566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-0566" }, { "cve": "CVE-2022-0581", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-0581" }, { "cve": "CVE-2022-0582", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-0582" }, { "cve": "CVE-2022-0583", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-0583" }, { "cve": "CVE-2022-0585", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-0585" }, { "cve": "CVE-2022-0586", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-0586" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-21248", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21248" }, { "cve": "CVE-2022-21263", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21263" }, { "cve": "CVE-2022-21271", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21271" }, { "cve": "CVE-2022-21282", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21282" }, { "cve": "CVE-2022-21291", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21291" }, { "cve": "CVE-2022-21293", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21293" }, { "cve": "CVE-2022-21294", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21294" }, { "cve": "CVE-2022-21296", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21296" }, { "cve": "CVE-2022-21298", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21298" }, { "cve": "CVE-2022-21299", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21299" }, { "cve": "CVE-2022-21305", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21305" }, { "cve": "CVE-2022-21340", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21340" }, { "cve": "CVE-2022-21341", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21341" }, { "cve": "CVE-2022-21349", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21349" }, { "cve": "CVE-2022-21360", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21360" }, { "cve": "CVE-2022-21365", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21365" }, { "cve": "CVE-2022-21375", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21375" }, { "cve": "CVE-2022-21384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21384" }, { "cve": "CVE-2022-21416", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21416" }, { "cve": "CVE-2022-21446", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21446" }, { "cve": "CVE-2022-21461", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21461" }, { "cve": "CVE-2022-21463", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21463" }, { "cve": "CVE-2022-21493", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21493" }, { "cve": "CVE-2022-21494", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21494" }, { "cve": "CVE-2022-21712", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21712" }, { "cve": "CVE-2022-21716", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21716" }, { "cve": "CVE-2022-21824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-21824" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22737" }, { "cve": "CVE-2022-22738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22738" }, { "cve": "CVE-2022-22739", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22739" }, { "cve": "CVE-2022-22740", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22740" }, { "cve": "CVE-2022-22741", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22741" }, { "cve": "CVE-2022-22742", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22742" }, { "cve": "CVE-2022-22743", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22743" }, { "cve": "CVE-2022-22744", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22744" }, { "cve": "CVE-2022-22745", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22745" }, { "cve": "CVE-2022-22746", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22746" }, { "cve": "CVE-2022-22747", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22747" }, { "cve": "CVE-2022-22748", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22748" }, { "cve": "CVE-2022-22751", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22751" }, { "cve": "CVE-2022-22753", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22753" }, { "cve": "CVE-2022-22754", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22754" }, { "cve": "CVE-2022-22756", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22756" }, { "cve": "CVE-2022-22759", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22759" }, { "cve": "CVE-2022-22760", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22760" }, { "cve": "CVE-2022-22761", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22761" }, { "cve": "CVE-2022-22763", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22763" }, { "cve": "CVE-2022-22764", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22764" }, { "cve": "CVE-2022-22815", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22815" }, { "cve": "CVE-2022-22816", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22816" }, { "cve": "CVE-2022-22817", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22817" }, { "cve": "CVE-2022-22818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22818" }, { "cve": "CVE-2022-22822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22824" }, { "cve": "CVE-2022-22825", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22825" }, { "cve": "CVE-2022-22826", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22826" }, { "cve": "CVE-2022-22827", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-22827" }, { "cve": "CVE-2022-23181", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-23181" }, { "cve": "CVE-2022-23833", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-23833" }, { "cve": "CVE-2022-23852", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23943", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-23943" }, { "cve": "CVE-2022-23990", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-23990" }, { "cve": "CVE-2022-24407", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-24407" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25313", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25314", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-25314" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-26381", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-26381" }, { "cve": "CVE-2022-26383", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-26383" }, { "cve": "CVE-2022-26384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-26384" }, { "cve": "CVE-2022-26386", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-26386" }, { "cve": "CVE-2022-26387", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-26387" }, { "cve": "CVE-2022-26485", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-26485" }, { "cve": "CVE-2022-26486", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00.000+00:00", "title": "CVE-2022-26486" } ] }
wid-sec-w-2025-1459
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Data Protection Advisor ist eine Monitoring L\u00f6sung. Der Collector ist der lokale Agent.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell Data Protection Advisor ausnutzen, um beliebigen Programmcode auszuf\u00fchren, um einen Denial of Service Angriff durchzuf\u00fchren, und um weitere nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-1459 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1459.json" }, { "category": "self", "summary": "WID-SEC-2025-1459 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1459" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-276 vom 2025-07-03", "url": "https://www.dell.com/support/kbdoc/000340538" } ], "source_lang": "en-US", "title": "Dell Data Protection Advisor: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-07-03T22:00:00.000+00:00", "generator": { "date": "2025-07-04T08:09:43.042+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-1459", "initial_release_date": "2025-07-03T22:00:00.000+00:00", "revision_history": [ { "date": "2025-07-03T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c19.12 SP 1", "product": { "name": "Dell Data Protection Advisor \u003c19.12 SP 1", "product_id": "T045044" } }, { "category": "product_version", "name": "19.12 SP 1", "product": { "name": "Dell Data Protection Advisor 19.12 SP 1", "product_id": "T045044-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:data_protection_advisor:19.12_sp_1" } } } ], "category": "product_name", "name": "Data Protection Advisor" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-0340", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2013-0340" }, { "cve": "CVE-2013-1624", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2013-1624" }, { "cve": "CVE-2014-3577", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2014-3577" }, { "cve": "CVE-2015-3193", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2015-3193" }, { "cve": "CVE-2015-3194", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2015-3194" }, { "cve": "CVE-2015-5262", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2015-5262" }, { "cve": "CVE-2016-0705", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2016-0705" }, { "cve": "CVE-2016-0797", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2016-0797" }, { "cve": "CVE-2016-0798", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2016-0798" }, { "cve": "CVE-2016-0799", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2016-0799" }, { "cve": "CVE-2016-2842", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2016-2842" }, { "cve": "CVE-2016-6306", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2016-6306" }, { "cve": "CVE-2017-3731", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2017-3731" }, { "cve": "CVE-2017-3732", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2017-3732" }, { "cve": "CVE-2018-5968", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2018-5968" }, { "cve": "CVE-2018-7489", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2018-7489" }, { "cve": "CVE-2019-16869", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2019-16869" }, { "cve": "CVE-2019-20444", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2019-20444" }, { "cve": "CVE-2019-20445", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2019-20445" }, { "cve": "CVE-2020-10683", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2020-10683" }, { "cve": "CVE-2020-11023", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2020-11023" }, { "cve": "CVE-2020-11612", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-25649", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-36518", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2020-36518" }, { "cve": "CVE-2021-21290", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-22696", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2021-22696" }, { "cve": "CVE-2021-30468", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2021-30468" }, { "cve": "CVE-2021-3597", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2021-3597" }, { "cve": "CVE-2021-3629", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2021-3629" }, { "cve": "CVE-2021-3690", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2021-3690" }, { "cve": "CVE-2021-3711", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-37136", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-3859", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2021-3859" }, { "cve": "CVE-2021-40690", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2021-40690" }, { "cve": "CVE-2021-43797", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-46877", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2021-46877" }, { "cve": "CVE-2022-1259", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2022-1259" }, { "cve": "CVE-2022-1319", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2022-1319" }, { "cve": "CVE-2022-2053", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2022-2053" }, { "cve": "CVE-2022-24823", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-2764", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2022-2764" }, { "cve": "CVE-2022-40152", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-41881", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-42003", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-46363", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2022-46363" }, { "cve": "CVE-2022-46364", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2022-46364" }, { "cve": "CVE-2022-46908", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2022-46908" }, { "cve": "CVE-2023-0482", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2023-0482" }, { "cve": "CVE-2023-1108", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2023-1108" }, { "cve": "CVE-2023-3223", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2023-3223" }, { "cve": "CVE-2023-34462", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-44483", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2023-44483" }, { "cve": "CVE-2024-1459", "product_status": { "known_affected": [ "T045044" ] }, "release_date": "2025-07-03T22:00:00.000+00:00", "title": "CVE-2024-1459" } ] }
wid-sec-w-2024-1186
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM DB2 ist ein relationales Datenbanksystem (RDBS) von IBM.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM DB2 REST ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1186 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1186.json" }, { "category": "self", "summary": "WID-SEC-2024-1186 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1186" }, { "category": "external", "summary": "IBM Security Bulletin - 7154484 vom 2024-05-20", "url": "https://www.ibm.com/support/pages/node/7154484" } ], "source_lang": "en-US", "title": "IBM DB2 REST: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-20T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:09:11.315+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1186", "initial_release_date": "2024-05-20T22:00:00.000+00:00", "revision_history": [ { "date": "2024-05-20T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "REST \u003c1.0.0.304-amd64", "product": { "name": "IBM DB2 REST \u003c1.0.0.304-amd64", "product_id": "T034928" } } ], "category": "product_name", "name": "DB2" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19126", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00.000+00:00", "title": "CVE-2019-19126" }, { "cve": "CVE-2020-10029", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00.000+00:00", "title": "CVE-2020-10029" }, { "cve": "CVE-2020-1751", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00.000+00:00", "title": "CVE-2020-1751" }, { "cve": "CVE-2020-1752", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00.000+00:00", "title": "CVE-2020-1752" }, { "cve": "CVE-2021-35942", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00.000+00:00", "title": "CVE-2021-35942" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00.000+00:00", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00.000+00:00", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-3999", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00.000+00:00", "title": "CVE-2021-3999" }, { "cve": "CVE-2021-4160", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00.000+00:00", "title": "CVE-2021-4160" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00.000+00:00", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00.000+00:00", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00.000+00:00", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00.000+00:00", "title": "CVE-2022-2097" }, { "cve": "CVE-2023-48795", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00.000+00:00", "title": "CVE-2023-48795" } ] }
opensuse-su-2021:2830-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssl-1_1", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssl-1_1 fixes the following security issues:\n\n- CVE-2021-3711: A bug in the implementation of the SM2 decryption code\n could lead to buffer overflows. [bsc#1189520]\n\n- CVE-2021-3712: a bug in the code for printing certificate details could\n lead to a buffer overrun that a malicious actor could exploit to crash\n the application, causing a denial-of-service attack. [bsc#1189521]\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-SLE-15.3-2021-2830", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_2830-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:2830-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YOUNRN5SCBRRVEIYDG3G3PFLGVRXKDPG/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:2830-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YOUNRN5SCBRRVEIYDG3G3PFLGVRXKDPG/" }, { "category": "self", "summary": "SUSE Bug 1189520", "url": "https://bugzilla.suse.com/1189520" }, { "category": "self", "summary": "SUSE Bug 1189521", "url": "https://bugzilla.suse.com/1189521" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3711 page", "url": "https://www.suse.com/security/cve/CVE-2021-3711/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3712 page", "url": "https://www.suse.com/security/cve/CVE-2021-3712/" } ], "title": "Security update for openssl-1_1", "tracking": { "current_release_date": "2021-08-24T14:20:43Z", "generator": { "date": "2021-08-24T14:20:43Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:2830-1", "initial_release_date": "2021-08-24T14:20:43Z", "revision_history": [ { "date": "2021-08-24T14:20:43Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "product": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "product_id": "libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1d-11.27.1.aarch64", "product": { "name": "libopenssl1_1-1.1.1d-11.27.1.aarch64", "product_id": "libopenssl1_1-1.1.1d-11.27.1.aarch64" } }, { "category": "product_version", "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "product": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "product_id": "libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1d-11.27.1.aarch64", "product": { "name": "openssl-1_1-1.1.1d-11.27.1.aarch64", "product_id": "openssl-1_1-1.1.1d-11.27.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssl-1_1-doc-1.1.1d-11.27.1.noarch", "product": { "name": "openssl-1_1-doc-1.1.1d-11.27.1.noarch", "product_id": "openssl-1_1-doc-1.1.1d-11.27.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "product": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "product_id": "libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1d-11.27.1.ppc64le", "product": { "name": "libopenssl1_1-1.1.1d-11.27.1.ppc64le", "product_id": "libopenssl1_1-1.1.1d-11.27.1.ppc64le" } }, { "category": "product_version", "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "product": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "product_id": "libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1d-11.27.1.ppc64le", "product": { "name": "openssl-1_1-1.1.1d-11.27.1.ppc64le", "product_id": "openssl-1_1-1.1.1d-11.27.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "product": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "product_id": "libopenssl-1_1-devel-1.1.1d-11.27.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1d-11.27.1.s390x", "product": { "name": "libopenssl1_1-1.1.1d-11.27.1.s390x", "product_id": "libopenssl1_1-1.1.1d-11.27.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "product": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "product_id": "libopenssl1_1-hmac-1.1.1d-11.27.1.s390x" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1d-11.27.1.s390x", "product": { "name": "openssl-1_1-1.1.1d-11.27.1.s390x", "product_id": "openssl-1_1-1.1.1d-11.27.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "product": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "product_id": "libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64" } }, { "category": "product_version", "name": "libopenssl-1_1-devel-32bit-1.1.1d-11.27.1.x86_64", "product": { "name": "libopenssl-1_1-devel-32bit-1.1.1d-11.27.1.x86_64", "product_id": "libopenssl-1_1-devel-32bit-1.1.1d-11.27.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1d-11.27.1.x86_64", "product": { "name": "libopenssl1_1-1.1.1d-11.27.1.x86_64", "product_id": "libopenssl1_1-1.1.1d-11.27.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "product": { "name": "libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "product_id": "libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "product": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "product_id": "libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "product": { "name": "libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "product_id": "libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1d-11.27.1.x86_64", "product": { "name": "openssl-1_1-1.1.1d-11.27.1.x86_64", "product_id": "openssl-1_1-1.1.1d-11.27.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64" }, "product_reference": "libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le" }, "product_reference": "libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x" }, "product_reference": "libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64" }, "product_reference": "libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-32bit-1.1.1d-11.27.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libopenssl-1_1-devel-32bit-1.1.1d-11.27.1.x86_64" }, "product_reference": "libopenssl-1_1-devel-32bit-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-11.27.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.aarch64" }, "product_reference": "libopenssl1_1-1.1.1d-11.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-11.27.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.ppc64le" }, "product_reference": "libopenssl1_1-1.1.1d-11.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-11.27.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.s390x" }, "product_reference": "libopenssl1_1-1.1.1d-11.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-11.27.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.x86_64" }, "product_reference": "libopenssl1_1-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64" }, "product_reference": "libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64" }, "product_reference": "libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le" }, "product_reference": "libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x" }, "product_reference": "libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64" }, "product_reference": "libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64" }, "product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-11.27.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.aarch64" }, "product_reference": "openssl-1_1-1.1.1d-11.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-11.27.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.ppc64le" }, "product_reference": "openssl-1_1-1.1.1d-11.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-11.27.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.s390x" }, "product_reference": "openssl-1_1-1.1.1d-11.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-11.27.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.x86_64" }, "product_reference": "openssl-1_1-1.1.1d-11.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-doc-1.1.1d-11.27.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:openssl-1_1-doc-1.1.1d-11.27.1.noarch" }, "product_reference": "openssl-1_1-doc-1.1.1d-11.27.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3711" } ], "notes": [ { "category": "general", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl-1_1-devel-32bit-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:openssl-1_1-doc-1.1.1d-11.27.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3711", "url": "https://www.suse.com/security/cve/CVE-2021-3711" }, { "category": "external", "summary": "SUSE Bug 1189520 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1189520" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1205663 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1205663" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl-1_1-devel-32bit-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:openssl-1_1-doc-1.1.1d-11.27.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl-1_1-devel-32bit-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:openssl-1_1-doc-1.1.1d-11.27.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-08-24T14:20:43Z", "details": "critical" } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3712" } ], "notes": [ { "category": "general", "text": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl-1_1-devel-32bit-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:openssl-1_1-doc-1.1.1d-11.27.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3712", "url": "https://www.suse.com/security/cve/CVE-2021-3712" }, { "category": "external", "summary": "SUSE Bug 1189521 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1189521" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1191640 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1191640" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1192787 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1192787" }, { "category": "external", "summary": "SUSE Bug 1194948 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1194948" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl-1_1-devel-32bit-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:openssl-1_1-doc-1.1.1d-11.27.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:libopenssl-1_1-devel-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl-1_1-devel-32bit-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:libopenssl1_1-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-32bit-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:libopenssl1_1-hmac-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:libopenssl1_1-hmac-32bit-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.aarch64", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.ppc64le", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.s390x", "openSUSE Leap 15.3:openssl-1_1-1.1.1d-11.27.1.x86_64", "openSUSE Leap 15.3:openssl-1_1-doc-1.1.1d-11.27.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-08-24T14:20:43Z", "details": "moderate" } ], "title": "CVE-2021-3712" } ] }
opensuse-su-2024:11816-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "grafana-8.3.4-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the grafana-8.3.4-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11816", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11816-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2021-36222 page", "url": "https://www.suse.com/security/cve/CVE-2021-36222/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3711 page", "url": "https://www.suse.com/security/cve/CVE-2021-3711/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41174 page", "url": "https://www.suse.com/security/cve/CVE-2021-41174/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41244 page", "url": "https://www.suse.com/security/cve/CVE-2021-41244/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43798 page", "url": "https://www.suse.com/security/cve/CVE-2021-43798/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21673 page", "url": "https://www.suse.com/security/cve/CVE-2022-21673/" } ], "title": "grafana-8.3.4-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11816-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "grafana-8.3.4-1.1.aarch64", "product": { "name": "grafana-8.3.4-1.1.aarch64", "product_id": "grafana-8.3.4-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "grafana-8.3.4-1.1.ppc64le", "product": { "name": "grafana-8.3.4-1.1.ppc64le", "product_id": "grafana-8.3.4-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "grafana-8.3.4-1.1.s390x", "product": { "name": "grafana-8.3.4-1.1.s390x", "product_id": "grafana-8.3.4-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "grafana-8.3.4-1.1.x86_64", "product": { "name": "grafana-8.3.4-1.1.x86_64", "product_id": "grafana-8.3.4-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "grafana-8.3.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grafana-8.3.4-1.1.aarch64" }, "product_reference": "grafana-8.3.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.3.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grafana-8.3.4-1.1.ppc64le" }, "product_reference": "grafana-8.3.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.3.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grafana-8.3.4-1.1.s390x" }, "product_reference": "grafana-8.3.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-8.3.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grafana-8.3.4-1.1.x86_64" }, "product_reference": "grafana-8.3.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-36222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-36222" } ], "notes": [ { "category": "general", "text": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:grafana-8.3.4-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.3.4-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.3.4-1.1.s390x", "openSUSE Tumbleweed:grafana-8.3.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-36222", "url": "https://www.suse.com/security/cve/CVE-2021-36222" }, { "category": "external", "summary": "SUSE Bug 1188571 for CVE-2021-36222", "url": "https://bugzilla.suse.com/1188571" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:grafana-8.3.4-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.3.4-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.3.4-1.1.s390x", "openSUSE Tumbleweed:grafana-8.3.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:grafana-8.3.4-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.3.4-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.3.4-1.1.s390x", "openSUSE Tumbleweed:grafana-8.3.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-36222" }, { "cve": "CVE-2021-3711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3711" } ], "notes": [ { "category": "general", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:grafana-8.3.4-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.3.4-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.3.4-1.1.s390x", "openSUSE Tumbleweed:grafana-8.3.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3711", "url": "https://www.suse.com/security/cve/CVE-2021-3711" }, { "category": "external", "summary": "SUSE Bug 1189520 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1189520" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1205663 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1205663" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:grafana-8.3.4-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.3.4-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.3.4-1.1.s390x", "openSUSE Tumbleweed:grafana-8.3.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:grafana-8.3.4-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.3.4-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.3.4-1.1.s390x", "openSUSE Tumbleweed:grafana-8.3.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2021-41174", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41174" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions if an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim\u0027s browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} ex: {{constructor.constructor(\u0027alert(1)\u0027)()}}. When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. Users are advised to upgrade as soon as possible. If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string {{ in the path.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:grafana-8.3.4-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.3.4-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.3.4-1.1.s390x", "openSUSE Tumbleweed:grafana-8.3.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41174", "url": "https://www.suse.com/security/cve/CVE-2021-41174" }, { "category": "external", "summary": "SUSE Bug 1192383 for CVE-2021-41174", "url": "https://bugzilla.suse.com/1192383" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:grafana-8.3.4-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.3.4-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.3.4-1.1.s390x", "openSUSE Tumbleweed:grafana-8.3.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:grafana-8.3.4-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.3.4-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.3.4-1.1.s390x", "openSUSE Tumbleweed:grafana-8.3.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-41174" }, { "cve": "CVE-2021-41244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41244" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions when the fine-grained access control beta feature is enabled and there is more than one organization in the Grafana instance admins are able to access users from other organizations. Grafana 8.0 introduced a mechanism which allowed users with the Organization Admin role to list, add, remove, and update users\u0027 roles in other organizations in which they are not an admin. With fine-grained access control enabled, organization admins can list, add, remove and update users\u0027 roles in another organization, where they do not have organization admin role. All installations between v8.0 and v8.2.3 that have fine-grained access control beta enabled and more than one organization should be upgraded as soon as possible. If you cannot upgrade, you should turn off the fine-grained access control using a feature flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:grafana-8.3.4-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.3.4-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.3.4-1.1.s390x", "openSUSE Tumbleweed:grafana-8.3.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41244", "url": "https://www.suse.com/security/cve/CVE-2021-41244" }, { "category": "external", "summary": "SUSE Bug 1192763 for CVE-2021-41244", "url": "https://bugzilla.suse.com/1192763" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:grafana-8.3.4-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.3.4-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.3.4-1.1.s390x", "openSUSE Tumbleweed:grafana-8.3.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:grafana-8.3.4-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.3.4-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.3.4-1.1.s390x", "openSUSE Tumbleweed:grafana-8.3.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2021-41244" }, { "cve": "CVE-2021-43798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43798" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `\u003cgrafana_host_url\u003e/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:grafana-8.3.4-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.3.4-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.3.4-1.1.s390x", "openSUSE Tumbleweed:grafana-8.3.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43798", "url": "https://www.suse.com/security/cve/CVE-2021-43798" }, { "category": "external", "summary": "SUSE Bug 1193492 for CVE-2021-43798", "url": "https://bugzilla.suse.com/1193492" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:grafana-8.3.4-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.3.4-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.3.4-1.1.s390x", "openSUSE Tumbleweed:grafana-8.3.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:grafana-8.3.4-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.3.4-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.3.4-1.1.s390x", "openSUSE Tumbleweed:grafana-8.3.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-43798" }, { "cve": "CVE-2022-21673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21673" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. In affected versions when a data source has the Forward OAuth Identity feature enabled, sending a query to that datasource with an API token (and no other user credentials) will forward the OAuth Identity of the most recently logged-in user. This can allow API token holders to retrieve data for which they may not have intended access. This attack relies on the Grafana instance having data sources that support the Forward OAuth Identity feature, the Grafana instance having a data source with the Forward OAuth Identity feature toggled on, the Grafana instance having OAuth enabled, and the Grafana instance having usable API keys. This issue has been patched in versions 7.5.13 and 8.3.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:grafana-8.3.4-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.3.4-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.3.4-1.1.s390x", "openSUSE Tumbleweed:grafana-8.3.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21673", "url": "https://www.suse.com/security/cve/CVE-2022-21673" }, { "category": "external", "summary": "SUSE Bug 1194873 for CVE-2022-21673", "url": "https://bugzilla.suse.com/1194873" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:grafana-8.3.4-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.3.4-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.3.4-1.1.s390x", "openSUSE Tumbleweed:grafana-8.3.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:grafana-8.3.4-1.1.aarch64", "openSUSE Tumbleweed:grafana-8.3.4-1.1.ppc64le", "openSUSE Tumbleweed:grafana-8.3.4-1.1.s390x", "openSUSE Tumbleweed:grafana-8.3.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-21673" } ] }
opensuse-su-2021:1188-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssl-1_1", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssl-1_1 fixes the following security issues:\n\n- CVE-2021-3711: A bug in the implementation of the SM2 decryption code\n could lead to buffer overflows. [bsc#1189520]\n\n- CVE-2021-3712: a bug in the code for printing certificate details could\n lead to a buffer overrun that a malicious actor could exploit to crash\n the application, causing a denial-of-service attack. [bsc#1189521]\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2021-1188", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1188-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:1188-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YXBKWFNVQ5GSDMIZHMMOGHRWWUOWZMJE/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:1188-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YXBKWFNVQ5GSDMIZHMMOGHRWWUOWZMJE/" }, { "category": "self", "summary": "SUSE Bug 1189520", "url": "https://bugzilla.suse.com/1189520" }, { "category": "self", "summary": "SUSE Bug 1189521", "url": "https://bugzilla.suse.com/1189521" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3711 page", "url": "https://www.suse.com/security/cve/CVE-2021-3711/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3712 page", "url": "https://www.suse.com/security/cve/CVE-2021-3712/" } ], "title": "Security update for openssl-1_1", "tracking": { "current_release_date": "2021-08-25T04:52:31Z", "generator": { "date": "2021-08-25T04:52:31Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:1188-1", "initial_release_date": "2021-08-25T04:52:31Z", "revision_history": [ { "date": "2021-08-25T04:52:31Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.i586", "product": { "name": "libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.i586", "product_id": "libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.i586" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1d-lp152.7.21.1.i586", "product": { "name": "libopenssl1_1-1.1.1d-lp152.7.21.1.i586", "product_id": "libopenssl1_1-1.1.1d-lp152.7.21.1.i586" } }, { "category": "product_version", "name": "libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.i586", "product": { "name": "libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.i586", "product_id": "libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.i586" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1d-lp152.7.21.1.i586", "product": { "name": "openssl-1_1-1.1.1d-lp152.7.21.1.i586", "product_id": "openssl-1_1-1.1.1d-lp152.7.21.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "openssl-1_1-doc-1.1.1d-lp152.7.21.1.noarch", "product": { "name": "openssl-1_1-doc-1.1.1d-lp152.7.21.1.noarch", "product_id": "openssl-1_1-doc-1.1.1d-lp152.7.21.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.x86_64", "product": { "name": "libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.x86_64", "product_id": "libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.x86_64" } }, { "category": "product_version", "name": "libopenssl-1_1-devel-32bit-1.1.1d-lp152.7.21.1.x86_64", "product": { "name": "libopenssl-1_1-devel-32bit-1.1.1d-lp152.7.21.1.x86_64", "product_id": "libopenssl-1_1-devel-32bit-1.1.1d-lp152.7.21.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1d-lp152.7.21.1.x86_64", "product": { "name": "libopenssl1_1-1.1.1d-lp152.7.21.1.x86_64", "product_id": "libopenssl1_1-1.1.1d-lp152.7.21.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_1-32bit-1.1.1d-lp152.7.21.1.x86_64", "product": { "name": "libopenssl1_1-32bit-1.1.1d-lp152.7.21.1.x86_64", "product_id": "libopenssl1_1-32bit-1.1.1d-lp152.7.21.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.x86_64", "product": { "name": "libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.x86_64", "product_id": "libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_1-hmac-32bit-1.1.1d-lp152.7.21.1.x86_64", "product": { "name": "libopenssl1_1-hmac-32bit-1.1.1d-lp152.7.21.1.x86_64", "product_id": "libopenssl1_1-hmac-32bit-1.1.1d-lp152.7.21.1.x86_64" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1d-lp152.7.21.1.x86_64", "product": { "name": "openssl-1_1-1.1.1d-lp152.7.21.1.x86_64", "product_id": "openssl-1_1-1.1.1d-lp152.7.21.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.i586" }, "product_reference": "libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.x86_64" }, "product_reference": "libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-32bit-1.1.1d-lp152.7.21.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:libopenssl-1_1-devel-32bit-1.1.1d-lp152.7.21.1.x86_64" }, "product_reference": "libopenssl-1_1-devel-32bit-1.1.1d-lp152.7.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-lp152.7.21.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:libopenssl1_1-1.1.1d-lp152.7.21.1.i586" }, "product_reference": "libopenssl1_1-1.1.1d-lp152.7.21.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1d-lp152.7.21.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:libopenssl1_1-1.1.1d-lp152.7.21.1.x86_64" }, "product_reference": "libopenssl1_1-1.1.1d-lp152.7.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-32bit-1.1.1d-lp152.7.21.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:libopenssl1_1-32bit-1.1.1d-lp152.7.21.1.x86_64" }, "product_reference": "libopenssl1_1-32bit-1.1.1d-lp152.7.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.i586" }, "product_reference": "libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.x86_64" }, "product_reference": "libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-32bit-1.1.1d-lp152.7.21.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:libopenssl1_1-hmac-32bit-1.1.1d-lp152.7.21.1.x86_64" }, "product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-lp152.7.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-lp152.7.21.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:openssl-1_1-1.1.1d-lp152.7.21.1.i586" }, "product_reference": "openssl-1_1-1.1.1d-lp152.7.21.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1d-lp152.7.21.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:openssl-1_1-1.1.1d-lp152.7.21.1.x86_64" }, "product_reference": "openssl-1_1-1.1.1d-lp152.7.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-doc-1.1.1d-lp152.7.21.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:openssl-1_1-doc-1.1.1d-lp152.7.21.1.noarch" }, "product_reference": "openssl-1_1-doc-1.1.1d-lp152.7.21.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3711" } ], "notes": [ { "category": "general", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl-1_1-devel-32bit-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:libopenssl1_1-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-32bit-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-hmac-32bit-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:openssl-1_1-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:openssl-1_1-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:openssl-1_1-doc-1.1.1d-lp152.7.21.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3711", "url": "https://www.suse.com/security/cve/CVE-2021-3711" }, { "category": "external", "summary": "SUSE Bug 1189520 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1189520" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1205663 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1205663" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl-1_1-devel-32bit-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:libopenssl1_1-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-32bit-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-hmac-32bit-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:openssl-1_1-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:openssl-1_1-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:openssl-1_1-doc-1.1.1d-lp152.7.21.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl-1_1-devel-32bit-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:libopenssl1_1-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-32bit-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-hmac-32bit-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:openssl-1_1-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:openssl-1_1-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:openssl-1_1-doc-1.1.1d-lp152.7.21.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-08-25T04:52:31Z", "details": "critical" } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3712" } ], "notes": [ { "category": "general", "text": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl-1_1-devel-32bit-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:libopenssl1_1-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-32bit-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-hmac-32bit-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:openssl-1_1-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:openssl-1_1-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:openssl-1_1-doc-1.1.1d-lp152.7.21.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3712", "url": "https://www.suse.com/security/cve/CVE-2021-3712" }, { "category": "external", "summary": "SUSE Bug 1189521 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1189521" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1191640 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1191640" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1192787 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1192787" }, { "category": "external", "summary": "SUSE Bug 1194948 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1194948" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl-1_1-devel-32bit-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:libopenssl1_1-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-32bit-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-hmac-32bit-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:openssl-1_1-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:openssl-1_1-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:openssl-1_1-doc-1.1.1d-lp152.7.21.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:libopenssl-1_1-devel-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl-1_1-devel-32bit-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:libopenssl1_1-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-32bit-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:libopenssl1_1-hmac-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:libopenssl1_1-hmac-32bit-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:openssl-1_1-1.1.1d-lp152.7.21.1.i586", "openSUSE Leap 15.2:openssl-1_1-1.1.1d-lp152.7.21.1.x86_64", "openSUSE Leap 15.2:openssl-1_1-doc-1.1.1d-lp152.7.21.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-08-25T04:52:31Z", "details": "moderate" } ], "title": "CVE-2021-3712" } ] }
opensuse-su-2025:15136-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "grype-0.92.1-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the grype-0.92.1-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15136", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15136-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2025:15136-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2QBML6L7L5D24KOH62TTXXD5XXJHMEM/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2025:15136-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2QBML6L7L5D24KOH62TTXXD5XXJHMEM/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3711 page", "url": "https://www.suse.com/security/cve/CVE-2021-3711/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2068 page", "url": "https://www.suse.com/security/cve/CVE-2022-2068/" } ], "title": "grype-0.92.1-1.1 on GA media", "tracking": { "current_release_date": "2025-05-20T00:00:00Z", "generator": { "date": "2025-05-20T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15136-1", "initial_release_date": "2025-05-20T00:00:00Z", "revision_history": [ { "date": "2025-05-20T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "grype-0.92.1-1.1.aarch64", "product": { "name": "grype-0.92.1-1.1.aarch64", "product_id": "grype-0.92.1-1.1.aarch64" } }, { "category": "product_version", "name": "grype-bash-completion-0.92.1-1.1.aarch64", "product": { "name": "grype-bash-completion-0.92.1-1.1.aarch64", "product_id": "grype-bash-completion-0.92.1-1.1.aarch64" } }, { "category": "product_version", "name": "grype-fish-completion-0.92.1-1.1.aarch64", "product": { "name": "grype-fish-completion-0.92.1-1.1.aarch64", "product_id": "grype-fish-completion-0.92.1-1.1.aarch64" } }, { "category": "product_version", "name": "grype-zsh-completion-0.92.1-1.1.aarch64", "product": { "name": "grype-zsh-completion-0.92.1-1.1.aarch64", "product_id": "grype-zsh-completion-0.92.1-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "grype-0.92.1-1.1.ppc64le", "product": { "name": "grype-0.92.1-1.1.ppc64le", "product_id": "grype-0.92.1-1.1.ppc64le" } }, { "category": "product_version", "name": "grype-bash-completion-0.92.1-1.1.ppc64le", "product": { "name": "grype-bash-completion-0.92.1-1.1.ppc64le", "product_id": "grype-bash-completion-0.92.1-1.1.ppc64le" } }, { "category": "product_version", "name": "grype-fish-completion-0.92.1-1.1.ppc64le", "product": { "name": "grype-fish-completion-0.92.1-1.1.ppc64le", "product_id": "grype-fish-completion-0.92.1-1.1.ppc64le" } }, { "category": "product_version", "name": "grype-zsh-completion-0.92.1-1.1.ppc64le", "product": { "name": "grype-zsh-completion-0.92.1-1.1.ppc64le", "product_id": "grype-zsh-completion-0.92.1-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "grype-0.92.1-1.1.s390x", "product": { "name": "grype-0.92.1-1.1.s390x", "product_id": "grype-0.92.1-1.1.s390x" } }, { "category": "product_version", "name": "grype-bash-completion-0.92.1-1.1.s390x", "product": { "name": "grype-bash-completion-0.92.1-1.1.s390x", "product_id": "grype-bash-completion-0.92.1-1.1.s390x" } }, { "category": "product_version", "name": "grype-fish-completion-0.92.1-1.1.s390x", "product": { "name": "grype-fish-completion-0.92.1-1.1.s390x", "product_id": "grype-fish-completion-0.92.1-1.1.s390x" } }, { "category": "product_version", "name": "grype-zsh-completion-0.92.1-1.1.s390x", "product": { "name": "grype-zsh-completion-0.92.1-1.1.s390x", "product_id": "grype-zsh-completion-0.92.1-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "grype-0.92.1-1.1.x86_64", "product": { "name": "grype-0.92.1-1.1.x86_64", "product_id": "grype-0.92.1-1.1.x86_64" } }, { "category": "product_version", "name": "grype-bash-completion-0.92.1-1.1.x86_64", "product": { "name": "grype-bash-completion-0.92.1-1.1.x86_64", "product_id": "grype-bash-completion-0.92.1-1.1.x86_64" } }, { "category": "product_version", "name": "grype-fish-completion-0.92.1-1.1.x86_64", "product": { "name": "grype-fish-completion-0.92.1-1.1.x86_64", "product_id": "grype-fish-completion-0.92.1-1.1.x86_64" } }, { "category": "product_version", "name": "grype-zsh-completion-0.92.1-1.1.x86_64", "product": { "name": "grype-zsh-completion-0.92.1-1.1.x86_64", "product_id": "grype-zsh-completion-0.92.1-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "grype-0.92.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grype-0.92.1-1.1.aarch64" }, "product_reference": "grype-0.92.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grype-0.92.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grype-0.92.1-1.1.ppc64le" }, "product_reference": "grype-0.92.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grype-0.92.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grype-0.92.1-1.1.s390x" }, "product_reference": "grype-0.92.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grype-0.92.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grype-0.92.1-1.1.x86_64" }, "product_reference": "grype-0.92.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grype-bash-completion-0.92.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.aarch64" }, "product_reference": "grype-bash-completion-0.92.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grype-bash-completion-0.92.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.ppc64le" }, "product_reference": "grype-bash-completion-0.92.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grype-bash-completion-0.92.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.s390x" }, "product_reference": "grype-bash-completion-0.92.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grype-bash-completion-0.92.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.x86_64" }, "product_reference": "grype-bash-completion-0.92.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grype-fish-completion-0.92.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.aarch64" }, "product_reference": "grype-fish-completion-0.92.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grype-fish-completion-0.92.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.ppc64le" }, "product_reference": "grype-fish-completion-0.92.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grype-fish-completion-0.92.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.s390x" }, "product_reference": "grype-fish-completion-0.92.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grype-fish-completion-0.92.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.x86_64" }, "product_reference": "grype-fish-completion-0.92.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grype-zsh-completion-0.92.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.aarch64" }, "product_reference": "grype-zsh-completion-0.92.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grype-zsh-completion-0.92.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.ppc64le" }, "product_reference": "grype-zsh-completion-0.92.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grype-zsh-completion-0.92.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.s390x" }, "product_reference": "grype-zsh-completion-0.92.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "grype-zsh-completion-0.92.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.x86_64" }, "product_reference": "grype-zsh-completion-0.92.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3711" } ], "notes": [ { "category": "general", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:grype-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-0.92.1-1.1.x86_64", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.x86_64", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.x86_64", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3711", "url": "https://www.suse.com/security/cve/CVE-2021-3711" }, { "category": "external", "summary": "SUSE Bug 1189520 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1189520" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1205663 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1205663" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:grype-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-0.92.1-1.1.x86_64", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.x86_64", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.x86_64", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:grype-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-0.92.1-1.1.x86_64", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.x86_64", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.x86_64", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-20T00:00:00Z", "details": "critical" } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2022-2068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2068" } ], "notes": [ { "category": "general", "text": "In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:grype-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-0.92.1-1.1.x86_64", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.x86_64", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.x86_64", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2068", "url": "https://www.suse.com/security/cve/CVE-2022-2068" }, { "category": "external", "summary": "SUSE Bug 1200550 for CVE-2022-2068", "url": "https://bugzilla.suse.com/1200550" }, { "category": "external", "summary": "SUSE Bug 1207568 for CVE-2022-2068", "url": "https://bugzilla.suse.com/1207568" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2022-2068", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:grype-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-0.92.1-1.1.x86_64", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.x86_64", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.x86_64", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:grype-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-0.92.1-1.1.x86_64", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-bash-completion-0.92.1-1.1.x86_64", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-fish-completion-0.92.1-1.1.x86_64", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.aarch64", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.ppc64le", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.s390x", "openSUSE Tumbleweed:grype-zsh-completion-0.92.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-20T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-2068" } ] }
opensuse-su-2024:11127-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "libopenssl-1_1-devel-1.1.1l-1.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the libopenssl-1_1-devel-1.1.1l-1.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11127", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11127-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2006-2937 page", "url": "https://www.suse.com/security/cve/CVE-2006-2937/" }, { "category": "self", "summary": "SUSE CVE CVE-2006-2940 page", "url": "https://www.suse.com/security/cve/CVE-2006-2940/" }, { "category": "self", "summary": "SUSE CVE CVE-2006-3738 page", "url": "https://www.suse.com/security/cve/CVE-2006-3738/" }, { "category": "self", "summary": "SUSE CVE CVE-2006-4339 page", "url": "https://www.suse.com/security/cve/CVE-2006-4339/" }, { "category": "self", "summary": "SUSE CVE CVE-2006-4343 page", "url": "https://www.suse.com/security/cve/CVE-2006-4343/" }, { "category": "self", "summary": "SUSE CVE CVE-2006-7250 page", "url": "https://www.suse.com/security/cve/CVE-2006-7250/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-3108 page", "url": "https://www.suse.com/security/cve/CVE-2007-3108/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-5135 page", "url": "https://www.suse.com/security/cve/CVE-2007-5135/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-0891 page", "url": "https://www.suse.com/security/cve/CVE-2008-0891/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-1672 page", "url": "https://www.suse.com/security/cve/CVE-2008-1672/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-5077 page", "url": "https://www.suse.com/security/cve/CVE-2008-5077/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-0590 page", "url": "https://www.suse.com/security/cve/CVE-2009-0590/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-0591 page", "url": "https://www.suse.com/security/cve/CVE-2009-0591/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-0789 page", "url": "https://www.suse.com/security/cve/CVE-2009-0789/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-1377 page", "url": "https://www.suse.com/security/cve/CVE-2009-1377/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-1378 page", "url": "https://www.suse.com/security/cve/CVE-2009-1378/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-1379 page", "url": "https://www.suse.com/security/cve/CVE-2009-1379/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-1386 page", "url": "https://www.suse.com/security/cve/CVE-2009-1386/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-1387 page", "url": "https://www.suse.com/security/cve/CVE-2009-1387/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-0740 page", "url": "https://www.suse.com/security/cve/CVE-2010-0740/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-0742 page", "url": "https://www.suse.com/security/cve/CVE-2010-0742/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-1633 page", "url": "https://www.suse.com/security/cve/CVE-2010-1633/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2939 page", "url": "https://www.suse.com/security/cve/CVE-2010-2939/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3864 page", "url": "https://www.suse.com/security/cve/CVE-2010-3864/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-5298 page", "url": "https://www.suse.com/security/cve/CVE-2010-5298/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-0014 page", "url": "https://www.suse.com/security/cve/CVE-2011-0014/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3207 page", "url": "https://www.suse.com/security/cve/CVE-2011-3207/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-4108 page", "url": "https://www.suse.com/security/cve/CVE-2011-4108/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-4576 page", "url": "https://www.suse.com/security/cve/CVE-2011-4576/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-4577 page", "url": "https://www.suse.com/security/cve/CVE-2011-4577/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-4619 page", "url": "https://www.suse.com/security/cve/CVE-2011-4619/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-0027 page", "url": "https://www.suse.com/security/cve/CVE-2012-0027/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-0050 page", "url": "https://www.suse.com/security/cve/CVE-2012-0050/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-0884 page", "url": "https://www.suse.com/security/cve/CVE-2012-0884/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1165 page", "url": "https://www.suse.com/security/cve/CVE-2012-1165/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2110 page", "url": "https://www.suse.com/security/cve/CVE-2012-2110/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2686 page", "url": "https://www.suse.com/security/cve/CVE-2012-2686/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-4929 page", "url": "https://www.suse.com/security/cve/CVE-2012-4929/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0166 page", "url": "https://www.suse.com/security/cve/CVE-2013-0166/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0169 page", "url": "https://www.suse.com/security/cve/CVE-2013-0169/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4353 page", "url": "https://www.suse.com/security/cve/CVE-2013-4353/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6449 page", "url": "https://www.suse.com/security/cve/CVE-2013-6449/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6450 page", "url": "https://www.suse.com/security/cve/CVE-2013-6450/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0076 page", "url": "https://www.suse.com/security/cve/CVE-2014-0076/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0160 page", "url": "https://www.suse.com/security/cve/CVE-2014-0160/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0195 page", "url": "https://www.suse.com/security/cve/CVE-2014-0195/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0198 page", "url": "https://www.suse.com/security/cve/CVE-2014-0198/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0221 page", "url": "https://www.suse.com/security/cve/CVE-2014-0221/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0224 page", "url": "https://www.suse.com/security/cve/CVE-2014-0224/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3470 page", "url": "https://www.suse.com/security/cve/CVE-2014-3470/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3505 page", "url": "https://www.suse.com/security/cve/CVE-2014-3505/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3506 page", "url": "https://www.suse.com/security/cve/CVE-2014-3506/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3507 page", "url": "https://www.suse.com/security/cve/CVE-2014-3507/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3508 page", "url": "https://www.suse.com/security/cve/CVE-2014-3508/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3509 page", "url": "https://www.suse.com/security/cve/CVE-2014-3509/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3510 page", "url": "https://www.suse.com/security/cve/CVE-2014-3510/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3511 page", "url": "https://www.suse.com/security/cve/CVE-2014-3511/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3512 page", "url": "https://www.suse.com/security/cve/CVE-2014-3512/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3513 page", "url": "https://www.suse.com/security/cve/CVE-2014-3513/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3567 page", "url": "https://www.suse.com/security/cve/CVE-2014-3567/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3568 page", "url": "https://www.suse.com/security/cve/CVE-2014-3568/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3569 page", "url": "https://www.suse.com/security/cve/CVE-2014-3569/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3570 page", "url": "https://www.suse.com/security/cve/CVE-2014-3570/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3571 page", "url": "https://www.suse.com/security/cve/CVE-2014-3571/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3572 page", "url": "https://www.suse.com/security/cve/CVE-2014-3572/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-5139 page", "url": "https://www.suse.com/security/cve/CVE-2014-5139/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8275 page", "url": "https://www.suse.com/security/cve/CVE-2014-8275/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0204 page", "url": "https://www.suse.com/security/cve/CVE-2015-0204/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0205 page", "url": "https://www.suse.com/security/cve/CVE-2015-0205/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0206 page", "url": "https://www.suse.com/security/cve/CVE-2015-0206/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0209 page", "url": "https://www.suse.com/security/cve/CVE-2015-0209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0286 page", "url": "https://www.suse.com/security/cve/CVE-2015-0286/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0287 page", "url": "https://www.suse.com/security/cve/CVE-2015-0287/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0288 page", "url": "https://www.suse.com/security/cve/CVE-2015-0288/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0289 page", "url": "https://www.suse.com/security/cve/CVE-2015-0289/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0293 page", "url": "https://www.suse.com/security/cve/CVE-2015-0293/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1788 page", "url": "https://www.suse.com/security/cve/CVE-2015-1788/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1789 page", "url": "https://www.suse.com/security/cve/CVE-2015-1789/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1790 page", "url": "https://www.suse.com/security/cve/CVE-2015-1790/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1791 page", "url": "https://www.suse.com/security/cve/CVE-2015-1791/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1792 page", "url": "https://www.suse.com/security/cve/CVE-2015-1792/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1793 page", "url": "https://www.suse.com/security/cve/CVE-2015-1793/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1794 page", "url": "https://www.suse.com/security/cve/CVE-2015-1794/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3193 page", "url": "https://www.suse.com/security/cve/CVE-2015-3193/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3194 page", "url": "https://www.suse.com/security/cve/CVE-2015-3194/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3195 page", "url": "https://www.suse.com/security/cve/CVE-2015-3195/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3196 page", "url": "https://www.suse.com/security/cve/CVE-2015-3196/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3197 page", "url": "https://www.suse.com/security/cve/CVE-2015-3197/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0701 page", "url": "https://www.suse.com/security/cve/CVE-2016-0701/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0702 page", "url": "https://www.suse.com/security/cve/CVE-2016-0702/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0705 page", "url": "https://www.suse.com/security/cve/CVE-2016-0705/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0797 page", "url": "https://www.suse.com/security/cve/CVE-2016-0797/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0798 page", "url": "https://www.suse.com/security/cve/CVE-2016-0798/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0800 page", "url": "https://www.suse.com/security/cve/CVE-2016-0800/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2105 page", "url": "https://www.suse.com/security/cve/CVE-2016-2105/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2106 page", "url": "https://www.suse.com/security/cve/CVE-2016-2106/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2107 page", "url": "https://www.suse.com/security/cve/CVE-2016-2107/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2109 page", "url": "https://www.suse.com/security/cve/CVE-2016-2109/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2176 page", "url": "https://www.suse.com/security/cve/CVE-2016-2176/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2177 page", "url": "https://www.suse.com/security/cve/CVE-2016-2177/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2178 page", "url": "https://www.suse.com/security/cve/CVE-2016-2178/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2179 page", "url": "https://www.suse.com/security/cve/CVE-2016-2179/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2180 page", "url": "https://www.suse.com/security/cve/CVE-2016-2180/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2181 page", "url": "https://www.suse.com/security/cve/CVE-2016-2181/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2182 page", "url": "https://www.suse.com/security/cve/CVE-2016-2182/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2183 page", "url": "https://www.suse.com/security/cve/CVE-2016-2183/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6302 page", "url": "https://www.suse.com/security/cve/CVE-2016-6302/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6303 page", "url": "https://www.suse.com/security/cve/CVE-2016-6303/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6304 page", "url": "https://www.suse.com/security/cve/CVE-2016-6304/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6306 page", "url": "https://www.suse.com/security/cve/CVE-2016-6306/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7052 page", "url": "https://www.suse.com/security/cve/CVE-2016-7052/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7055 page", "url": "https://www.suse.com/security/cve/CVE-2016-7055/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7056 page", "url": "https://www.suse.com/security/cve/CVE-2016-7056/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3731 page", "url": "https://www.suse.com/security/cve/CVE-2017-3731/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3732 page", "url": "https://www.suse.com/security/cve/CVE-2017-3732/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3735 page", "url": "https://www.suse.com/security/cve/CVE-2017-3735/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3736 page", "url": "https://www.suse.com/security/cve/CVE-2017-3736/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3738 page", "url": "https://www.suse.com/security/cve/CVE-2017-3738/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0732 page", "url": "https://www.suse.com/security/cve/CVE-2018-0732/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0734 page", "url": "https://www.suse.com/security/cve/CVE-2018-0734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0735 page", "url": "https://www.suse.com/security/cve/CVE-2018-0735/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0737 page", "url": "https://www.suse.com/security/cve/CVE-2018-0737/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0739 page", "url": "https://www.suse.com/security/cve/CVE-2018-0739/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1543 page", "url": "https://www.suse.com/security/cve/CVE-2019-1543/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1547 page", "url": "https://www.suse.com/security/cve/CVE-2019-1547/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1549 page", "url": "https://www.suse.com/security/cve/CVE-2019-1549/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1551 page", "url": "https://www.suse.com/security/cve/CVE-2019-1551/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1563 page", "url": "https://www.suse.com/security/cve/CVE-2019-1563/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1967 page", "url": "https://www.suse.com/security/cve/CVE-2020-1967/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1971 page", "url": "https://www.suse.com/security/cve/CVE-2020-1971/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23840 page", "url": "https://www.suse.com/security/cve/CVE-2021-23840/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23841 page", "url": "https://www.suse.com/security/cve/CVE-2021-23841/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3449 page", "url": "https://www.suse.com/security/cve/CVE-2021-3449/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3450 page", "url": "https://www.suse.com/security/cve/CVE-2021-3450/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3711 page", "url": "https://www.suse.com/security/cve/CVE-2021-3711/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3712 page", "url": "https://www.suse.com/security/cve/CVE-2021-3712/" } ], "title": "libopenssl-1_1-devel-1.1.1l-1.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11127-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "product": { "name": "libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "product_id": "libopenssl-1_1-devel-1.1.1l-1.2.aarch64" } }, { "category": "product_version", "name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "product": { "name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "product_id": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1l-1.2.aarch64", "product": { "name": "libopenssl1_1-1.1.1l-1.2.aarch64", "product_id": "libopenssl1_1-1.1.1l-1.2.aarch64" } }, { "category": "product_version", "name": "libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "product": { "name": "libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "product_id": "libopenssl1_1-32bit-1.1.1l-1.2.aarch64" } }, { "category": "product_version", "name": "libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "product": { "name": "libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "product_id": "libopenssl1_1-hmac-1.1.1l-1.2.aarch64" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1l-1.2.aarch64", "product": { "name": "openssl-1_1-1.1.1l-1.2.aarch64", "product_id": "openssl-1_1-1.1.1l-1.2.aarch64" } }, { "category": "product_version", "name": "openssl-1_1-doc-1.1.1l-1.2.aarch64", "product": { "name": "openssl-1_1-doc-1.1.1l-1.2.aarch64", "product_id": "openssl-1_1-doc-1.1.1l-1.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "product": { "name": "libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "product_id": "libopenssl-1_1-devel-1.1.1l-1.2.ppc64le" } }, { "category": "product_version", "name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "product": { "name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "product_id": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1l-1.2.ppc64le", "product": { "name": "libopenssl1_1-1.1.1l-1.2.ppc64le", "product_id": "libopenssl1_1-1.1.1l-1.2.ppc64le" } }, { "category": "product_version", "name": "libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "product": { "name": "libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "product_id": "libopenssl1_1-32bit-1.1.1l-1.2.ppc64le" } }, { "category": "product_version", "name": "libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "product": { "name": "libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "product_id": "libopenssl1_1-hmac-1.1.1l-1.2.ppc64le" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1l-1.2.ppc64le", "product": { "name": "openssl-1_1-1.1.1l-1.2.ppc64le", "product_id": "openssl-1_1-1.1.1l-1.2.ppc64le" } }, { "category": "product_version", "name": "openssl-1_1-doc-1.1.1l-1.2.ppc64le", "product": { "name": "openssl-1_1-doc-1.1.1l-1.2.ppc64le", "product_id": "openssl-1_1-doc-1.1.1l-1.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1l-1.2.s390x", "product": { "name": "libopenssl-1_1-devel-1.1.1l-1.2.s390x", "product_id": "libopenssl-1_1-devel-1.1.1l-1.2.s390x" } }, { "category": "product_version", "name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "product": { "name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "product_id": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1l-1.2.s390x", "product": { "name": "libopenssl1_1-1.1.1l-1.2.s390x", "product_id": "libopenssl1_1-1.1.1l-1.2.s390x" } }, { "category": "product_version", "name": "libopenssl1_1-32bit-1.1.1l-1.2.s390x", "product": { "name": "libopenssl1_1-32bit-1.1.1l-1.2.s390x", "product_id": "libopenssl1_1-32bit-1.1.1l-1.2.s390x" } }, { "category": "product_version", "name": "libopenssl1_1-hmac-1.1.1l-1.2.s390x", "product": { "name": "libopenssl1_1-hmac-1.1.1l-1.2.s390x", "product_id": "libopenssl1_1-hmac-1.1.1l-1.2.s390x" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1l-1.2.s390x", "product": { "name": "openssl-1_1-1.1.1l-1.2.s390x", "product_id": "openssl-1_1-1.1.1l-1.2.s390x" } }, { "category": "product_version", "name": "openssl-1_1-doc-1.1.1l-1.2.s390x", "product": { "name": "openssl-1_1-doc-1.1.1l-1.2.s390x", "product_id": "openssl-1_1-doc-1.1.1l-1.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "product": { "name": "libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "product_id": "libopenssl-1_1-devel-1.1.1l-1.2.x86_64" } }, { "category": "product_version", "name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "product": { "name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "product_id": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64" } }, { "category": "product_version", "name": "libopenssl1_1-1.1.1l-1.2.x86_64", "product": { "name": "libopenssl1_1-1.1.1l-1.2.x86_64", "product_id": "libopenssl1_1-1.1.1l-1.2.x86_64" } }, { "category": "product_version", "name": "libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "product": { "name": "libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "product_id": "libopenssl1_1-32bit-1.1.1l-1.2.x86_64" } }, { "category": "product_version", "name": "libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "product": { "name": "libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "product_id": "libopenssl1_1-hmac-1.1.1l-1.2.x86_64" } }, { "category": "product_version", "name": "openssl-1_1-1.1.1l-1.2.x86_64", "product": { "name": "openssl-1_1-1.1.1l-1.2.x86_64", "product_id": "openssl-1_1-1.1.1l-1.2.x86_64" } }, { "category": "product_version", "name": "openssl-1_1-doc-1.1.1l-1.2.x86_64", "product": { "name": "openssl-1_1-doc-1.1.1l-1.2.x86_64", "product_id": "openssl-1_1-doc-1.1.1l-1.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1l-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64" }, "product_reference": "libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1l-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le" }, "product_reference": "libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1l-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x" }, "product_reference": "libopenssl-1_1-devel-1.1.1l-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-1.1.1l-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64" }, "product_reference": "libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64" }, "product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le" }, "product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x" }, "product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64" }, "product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1l-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64" }, "product_reference": "libopenssl1_1-1.1.1l-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1l-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le" }, "product_reference": "libopenssl1_1-1.1.1l-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1l-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x" }, "product_reference": "libopenssl1_1-1.1.1l-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-1.1.1l-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64" }, "product_reference": "libopenssl1_1-1.1.1l-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-32bit-1.1.1l-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64" }, "product_reference": "libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-32bit-1.1.1l-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le" }, "product_reference": "libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-32bit-1.1.1l-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x" }, "product_reference": "libopenssl1_1-32bit-1.1.1l-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-32bit-1.1.1l-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64" }, "product_reference": "libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-1.1.1l-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64" }, "product_reference": "libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-1.1.1l-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le" }, "product_reference": "libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-1.1.1l-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x" }, "product_reference": "libopenssl1_1-hmac-1.1.1l-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_1-hmac-1.1.1l-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64" }, "product_reference": "libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1l-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64" }, "product_reference": "openssl-1_1-1.1.1l-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1l-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le" }, "product_reference": "openssl-1_1-1.1.1l-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1l-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x" }, "product_reference": "openssl-1_1-1.1.1l-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-1.1.1l-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64" }, "product_reference": "openssl-1_1-1.1.1l-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-doc-1.1.1l-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64" }, "product_reference": "openssl-1_1-doc-1.1.1l-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-doc-1.1.1l-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le" }, "product_reference": "openssl-1_1-doc-1.1.1l-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-doc-1.1.1l-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x" }, "product_reference": "openssl-1_1-doc-1.1.1l-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1_1-doc-1.1.1l-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" }, "product_reference": "openssl-1_1-doc-1.1.1l-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-2937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2006-2937" } ], "notes": [ { "category": "general", "text": "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2006-2937", "url": "https://www.suse.com/security/cve/CVE-2006-2937" }, { "category": "external", "summary": "SUSE Bug 202366 for CVE-2006-2937", "url": "https://bugzilla.suse.com/202366" }, { "category": "external", "summary": "SUSE Bug 207635 for CVE-2006-2937", "url": "https://bugzilla.suse.com/207635" }, { "category": "external", "summary": "SUSE Bug 215623 for CVE-2006-2937", "url": "https://bugzilla.suse.com/215623" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2006-2937" }, { "cve": "CVE-2006-2940", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2006-2940" } ], "notes": [ { "category": "general", "text": "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2006-2940", "url": "https://www.suse.com/security/cve/CVE-2006-2940" }, { "category": "external", "summary": "SUSE Bug 202366 for CVE-2006-2940", "url": "https://bugzilla.suse.com/202366" }, { "category": "external", "summary": "SUSE Bug 207635 for CVE-2006-2940", "url": "https://bugzilla.suse.com/207635" }, { "category": "external", "summary": "SUSE Bug 208971 for CVE-2006-2940", "url": "https://bugzilla.suse.com/208971" }, { "category": "external", "summary": "SUSE Bug 215623 for CVE-2006-2940", "url": "https://bugzilla.suse.com/215623" }, { "category": "external", "summary": "SUSE Bug 223040 for CVE-2006-2940", "url": "https://bugzilla.suse.com/223040" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2006-2940", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2006-2940" }, { "cve": "CVE-2006-3738", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2006-3738" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2006-3738", "url": "https://www.suse.com/security/cve/CVE-2006-3738" }, { "category": "external", "summary": "SUSE Bug 202366 for CVE-2006-3738", "url": "https://bugzilla.suse.com/202366" }, { "category": "external", "summary": "SUSE Bug 215623 for CVE-2006-3738", "url": "https://bugzilla.suse.com/215623" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2006-3738" }, { "cve": "CVE-2006-4339", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2006-4339" } ], "notes": [ { "category": "general", "text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2006-4339", "url": "https://www.suse.com/security/cve/CVE-2006-4339" }, { "category": "external", "summary": "SUSE Bug 202366 for CVE-2006-4339", "url": "https://bugzilla.suse.com/202366" }, { "category": "external", "summary": "SUSE Bug 203595 for CVE-2006-4339", "url": "https://bugzilla.suse.com/203595" }, { "category": "external", "summary": "SUSE Bug 206636 for CVE-2006-4339", "url": "https://bugzilla.suse.com/206636" }, { "category": "external", "summary": "SUSE Bug 207635 for CVE-2006-4339", "url": "https://bugzilla.suse.com/207635" }, { "category": "external", "summary": "SUSE Bug 215623 for CVE-2006-4339", "url": "https://bugzilla.suse.com/215623" }, { "category": "external", "summary": "SUSE Bug 218303 for CVE-2006-4339", "url": "https://bugzilla.suse.com/218303" }, { "category": "external", "summary": "SUSE Bug 233584 for CVE-2006-4339", "url": "https://bugzilla.suse.com/233584" }, { "category": "external", "summary": "SUSE Bug 564512 for CVE-2006-4339", "url": "https://bugzilla.suse.com/564512" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2006-4339" }, { "cve": "CVE-2006-4343", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2006-4343" } ], "notes": [ { "category": "general", "text": "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2006-4343", "url": "https://www.suse.com/security/cve/CVE-2006-4343" }, { "category": "external", "summary": "SUSE Bug 202366 for CVE-2006-4343", "url": "https://bugzilla.suse.com/202366" }, { "category": "external", "summary": "SUSE Bug 207635 for CVE-2006-4343", "url": "https://bugzilla.suse.com/207635" }, { "category": "external", "summary": "SUSE Bug 215623 for CVE-2006-4343", "url": "https://bugzilla.suse.com/215623" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2006-4343" }, { "cve": "CVE-2006-7250", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2006-7250" } ], "notes": [ { "category": "general", "text": "The mime_hdr_cmp function in crypto/asn1/asn_mime.c in OpenSSL 0.9.8t and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2006-7250", "url": "https://www.suse.com/security/cve/CVE-2006-7250" }, { "category": "external", "summary": "SUSE Bug 748738 for CVE-2006-7250", "url": "https://bugzilla.suse.com/748738" }, { "category": "external", "summary": "SUSE Bug 883307 for CVE-2006-7250", "url": "https://bugzilla.suse.com/883307" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2006-7250" }, { "cve": "CVE-2007-3108", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-3108" } ], "notes": [ { "category": "general", "text": "The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-3108", "url": "https://www.suse.com/security/cve/CVE-2007-3108" }, { "category": "external", "summary": "SUSE Bug 296511 for CVE-2007-3108", "url": "https://bugzilla.suse.com/296511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2007-3108" }, { "cve": "CVE-2007-5135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-5135" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738. As of 20071012, it is unknown whether code execution is possible.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-5135", "url": "https://www.suse.com/security/cve/CVE-2007-5135" }, { "category": "external", "summary": "SUSE Bug 329208 for CVE-2007-5135", "url": "https://bugzilla.suse.com/329208" }, { "category": "external", "summary": "SUSE Bug 331726 for CVE-2007-5135", "url": "https://bugzilla.suse.com/331726" }, { "category": "external", "summary": "SUSE Bug 363663 for CVE-2007-5135", "url": "https://bugzilla.suse.com/363663" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2007-5135" }, { "cve": "CVE-2008-0891", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-0891" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-0891", "url": "https://www.suse.com/security/cve/CVE-2008-0891" }, { "category": "external", "summary": "SUSE Bug 394317 for CVE-2008-0891", "url": "https://bugzilla.suse.com/394317" }, { "category": "external", "summary": "SUSE Bug 404511 for CVE-2008-0891", "url": "https://bugzilla.suse.com/404511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-0891" }, { "cve": "CVE-2008-1672", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-1672" } ], "notes": [ { "category": "general", "text": "OpenSSL 0.9.8f and 0.9.8g allows remote attackers to cause a denial of service (crash) via a TLS handshake that omits the Server Key Exchange message and uses \"particular cipher suites,\" which triggers a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-1672", "url": "https://www.suse.com/security/cve/CVE-2008-1672" }, { "category": "external", "summary": "SUSE Bug 394317 for CVE-2008-1672", "url": "https://bugzilla.suse.com/394317" }, { "category": "external", "summary": "SUSE Bug 404511 for CVE-2008-1672", "url": "https://bugzilla.suse.com/404511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-1672" }, { "cve": "CVE-2008-5077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-5077" } ], "notes": [ { "category": "general", "text": "OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-5077", "url": "https://www.suse.com/security/cve/CVE-2008-5077" }, { "category": "external", "summary": "SUSE Bug 459468 for CVE-2008-5077", "url": "https://bugzilla.suse.com/459468" }, { "category": "external", "summary": "SUSE Bug 465675 for CVE-2008-5077", "url": "https://bugzilla.suse.com/465675" }, { "category": "external", "summary": "SUSE Bug 465676 for CVE-2008-5077", "url": "https://bugzilla.suse.com/465676" }, { "category": "external", "summary": "SUSE Bug 468866 for CVE-2008-5077", "url": "https://bugzilla.suse.com/468866" }, { "category": "external", "summary": "SUSE Bug 470968 for CVE-2008-5077", "url": "https://bugzilla.suse.com/470968" }, { "category": "external", "summary": "SUSE Bug 475108 for CVE-2008-5077", "url": "https://bugzilla.suse.com/475108" }, { "category": "external", "summary": "SUSE Bug 552497 for CVE-2008-5077", "url": "https://bugzilla.suse.com/552497" }, { "category": "external", "summary": "SUSE Bug 629905 for CVE-2008-5077", "url": "https://bugzilla.suse.com/629905" }, { "category": "external", "summary": "SUSE Bug 708266 for CVE-2008-5077", "url": "https://bugzilla.suse.com/708266" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-5077" }, { "cve": "CVE-2009-0590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-0590" } ], "notes": [ { "category": "general", "text": "The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-0590", "url": "https://www.suse.com/security/cve/CVE-2009-0590" }, { "category": "external", "summary": "SUSE Bug 459468 for CVE-2009-0590", "url": "https://bugzilla.suse.com/459468" }, { "category": "external", "summary": "SUSE Bug 489641 for CVE-2009-0590", "url": "https://bugzilla.suse.com/489641" }, { "category": "external", "summary": "SUSE Bug 629905 for CVE-2009-0590", "url": "https://bugzilla.suse.com/629905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2009-0590" }, { "cve": "CVE-2009-0591", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-0591" } ], "notes": [ { "category": "general", "text": "The CMS_verify function in OpenSSL 0.9.8h through 0.9.8j, when CMS is enabled, does not properly handle errors associated with malformed signed attributes, which allows remote attackers to repudiate a signature that originally appeared to be valid but was actually invalid.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-0591", "url": "https://www.suse.com/security/cve/CVE-2009-0591" }, { "category": "external", "summary": "SUSE Bug 489641 for CVE-2009-0591", "url": "https://bugzilla.suse.com/489641" }, { "category": "external", "summary": "SUSE Bug 629905 for CVE-2009-0591", "url": "https://bugzilla.suse.com/629905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2009-0591" }, { "cve": "CVE-2009-0789", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-0789" } ], "notes": [ { "category": "general", "text": "OpenSSL before 0.9.8k on WIN64 and certain other platforms does not properly handle a malformed ASN.1 structure, which allows remote attackers to cause a denial of service (invalid memory access and application crash) by placing this structure in the public key of a certificate, as demonstrated by an RSA public key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-0789", "url": "https://www.suse.com/security/cve/CVE-2009-0789" }, { "category": "external", "summary": "SUSE Bug 459468 for CVE-2009-0789", "url": "https://bugzilla.suse.com/459468" }, { "category": "external", "summary": "SUSE Bug 489641 for CVE-2009-0789", "url": "https://bugzilla.suse.com/489641" }, { "category": "external", "summary": "SUSE Bug 629905 for CVE-2009-0789", "url": "https://bugzilla.suse.com/629905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-0789" }, { "cve": "CVE-2009-1377", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-1377" } ], "notes": [ { "category": "general", "text": "The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of \"future epoch\" DTLS records that are buffered in a queue, aka \"DTLS record buffer limitation bug.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-1377", "url": "https://www.suse.com/security/cve/CVE-2009-1377" }, { "category": "external", "summary": "SUSE Bug 459468 for CVE-2009-1377", "url": "https://bugzilla.suse.com/459468" }, { "category": "external", "summary": "SUSE Bug 504687 for CVE-2009-1377", "url": "https://bugzilla.suse.com/504687" }, { "category": "external", "summary": "SUSE Bug 629905 for CVE-2009-1377", "url": "https://bugzilla.suse.com/629905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2009-1377" }, { "cve": "CVE-2009-1378", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-1378" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka \"DTLS fragment handling memory leak.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-1378", "url": "https://www.suse.com/security/cve/CVE-2009-1378" }, { "category": "external", "summary": "SUSE Bug 459468 for CVE-2009-1378", "url": "https://bugzilla.suse.com/459468" }, { "category": "external", "summary": "SUSE Bug 504687 for CVE-2009-1378", "url": "https://bugzilla.suse.com/504687" }, { "category": "external", "summary": "SUSE Bug 629905 for CVE-2009-1378", "url": "https://bugzilla.suse.com/629905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2009-1378" }, { "cve": "CVE-2009-1379", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-1379" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-1379", "url": "https://www.suse.com/security/cve/CVE-2009-1379" }, { "category": "external", "summary": "SUSE Bug 459468 for CVE-2009-1379", "url": "https://bugzilla.suse.com/459468" }, { "category": "external", "summary": "SUSE Bug 504687 for CVE-2009-1379", "url": "https://bugzilla.suse.com/504687" }, { "category": "external", "summary": "SUSE Bug 629905 for CVE-2009-1379", "url": "https://bugzilla.suse.com/629905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2009-1379" }, { "cve": "CVE-2009-1386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-1386" } ], "notes": [ { "category": "general", "text": "ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-1386", "url": "https://www.suse.com/security/cve/CVE-2009-1386" }, { "category": "external", "summary": "SUSE Bug 459468 for CVE-2009-1386", "url": "https://bugzilla.suse.com/459468" }, { "category": "external", "summary": "SUSE Bug 509031 for CVE-2009-1386", "url": "https://bugzilla.suse.com/509031" }, { "category": "external", "summary": "SUSE Bug 515659 for CVE-2009-1386", "url": "https://bugzilla.suse.com/515659" }, { "category": "external", "summary": "SUSE Bug 629905 for CVE-2009-1386", "url": "https://bugzilla.suse.com/629905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2009-1386" }, { "cve": "CVE-2009-1387", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-1387" } ], "notes": [ { "category": "general", "text": "The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a \"fragment bug.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-1387", "url": "https://www.suse.com/security/cve/CVE-2009-1387" }, { "category": "external", "summary": "SUSE Bug 459468 for CVE-2009-1387", "url": "https://bugzilla.suse.com/459468" }, { "category": "external", "summary": "SUSE Bug 509031 for CVE-2009-1387", "url": "https://bugzilla.suse.com/509031" }, { "category": "external", "summary": "SUSE Bug 515659 for CVE-2009-1387", "url": "https://bugzilla.suse.com/515659" }, { "category": "external", "summary": "SUSE Bug 629905 for CVE-2009-1387", "url": "https://bugzilla.suse.com/629905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2009-1387" }, { "cve": "CVE-2010-0740", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-0740" } ], "notes": [ { "category": "general", "text": "The ssl3_get_record function in ssl/s3_pkt.c in OpenSSL 0.9.8f through 0.9.8m allows remote attackers to cause a denial of service (crash) via a malformed record in a TLS connection that triggers a NULL pointer dereference, related to the minor version number. NOTE: some of these details are obtained from third party information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-0740", "url": "https://www.suse.com/security/cve/CVE-2010-0740" }, { "category": "external", "summary": "SUSE Bug 590833 for CVE-2010-0740", "url": "https://bugzilla.suse.com/590833" }, { "category": "external", "summary": "SUSE Bug 629905 for CVE-2010-0740", "url": "https://bugzilla.suse.com/629905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-0740" }, { "cve": "CVE-2010-0742", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-0742" } ], "notes": [ { "category": "general", "text": "The Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain OriginatorInfo, which allows context-dependent attackers to modify invalid memory locations or conduct double-free attacks, and possibly execute arbitrary code, via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-0742", "url": "https://www.suse.com/security/cve/CVE-2010-0742" }, { "category": "external", "summary": "SUSE Bug 610642 for CVE-2010-0742", "url": "https://bugzilla.suse.com/610642" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2010-0742" }, { "cve": "CVE-2010-1633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-1633" } ], "notes": [ { "category": "general", "text": "RSA verification recovery in the EVP_PKEY_verify_recover function in OpenSSL 1.x before 1.0.0a, as used by pkeyutl and possibly other applications, returns uninitialized memory upon failure, which might allow context-dependent attackers to bypass intended key requirements or obtain sensitive information via unspecified vectors. NOTE: some of these details are obtained from third party information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-1633", "url": "https://www.suse.com/security/cve/CVE-2010-1633" }, { "category": "external", "summary": "SUSE Bug 610642 for CVE-2010-1633", "url": "https://bugzilla.suse.com/610642" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-1633" }, { "cve": "CVE-2010-2939", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2939" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the ssl3_get_key_exchange function in the OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and possibly other versions, when using ECDH, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted private key with an invalid prime. NOTE: some sources refer to this as a use-after-free issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2939", "url": "https://www.suse.com/security/cve/CVE-2010-2939" }, { "category": "external", "summary": "SUSE Bug 489641 for CVE-2010-2939", "url": "https://bugzilla.suse.com/489641" }, { "category": "external", "summary": "SUSE Bug 629905 for CVE-2010-2939", "url": "https://bugzilla.suse.com/629905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2939" }, { "cve": "CVE-2010-3864", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3864" } ], "notes": [ { "category": "general", "text": "Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3864", "url": "https://www.suse.com/security/cve/CVE-2010-3864" }, { "category": "external", "summary": "SUSE Bug 629905 for CVE-2010-3864", "url": "https://bugzilla.suse.com/629905" }, { "category": "external", "summary": "SUSE Bug 651003 for CVE-2010-3864", "url": "https://bugzilla.suse.com/651003" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2010-3864" }, { "cve": "CVE-2010-5298", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-5298" } ], "notes": [ { "category": "general", "text": "Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-5298", "url": "https://www.suse.com/security/cve/CVE-2010-5298" }, { "category": "external", "summary": "SUSE Bug 873351 for CVE-2010-5298", "url": "https://bugzilla.suse.com/873351" }, { "category": "external", "summary": "SUSE Bug 880891 for CVE-2010-5298", "url": "https://bugzilla.suse.com/880891" }, { "category": "external", "summary": "SUSE Bug 883126 for CVE-2010-5298", "url": "https://bugzilla.suse.com/883126" }, { "category": "external", "summary": "SUSE Bug 885777 for CVE-2010-5298", "url": "https://bugzilla.suse.com/885777" }, { "category": "external", "summary": "SUSE Bug 915913 for CVE-2010-5298", "url": "https://bugzilla.suse.com/915913" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2010-5298" }, { "cve": "CVE-2011-0014", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-0014" } ], "notes": [ { "category": "general", "text": "ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0 through 1.0.0c allows remote attackers to cause a denial of service (crash), and possibly obtain sensitive information in applications that use OpenSSL, via a malformed ClientHello handshake message that triggers an out-of-bounds memory access, aka \"OCSP stapling vulnerability.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-0014", "url": "https://www.suse.com/security/cve/CVE-2011-0014" }, { "category": "external", "summary": "SUSE Bug 670526 for CVE-2011-0014", "url": "https://bugzilla.suse.com/670526" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-0014" }, { "cve": "CVE-2011-3207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3207" } ], "notes": [ { "category": "general", "text": "crypto/x509/x509_vfy.c in OpenSSL 1.0.x before 1.0.0e does not initialize certain structure members, which makes it easier for remote attackers to bypass CRL validation by using a nextUpdate value corresponding to a time in the past.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3207", "url": "https://www.suse.com/security/cve/CVE-2011-3207" }, { "category": "external", "summary": "SUSE Bug 716143 for CVE-2011-3207", "url": "https://bugzilla.suse.com/716143" }, { "category": "external", "summary": "SUSE Bug 854391 for CVE-2011-3207", "url": "https://bugzilla.suse.com/854391" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-3207" }, { "cve": "CVE-2011-4108", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-4108" } ], "notes": [ { "category": "general", "text": "The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-4108", "url": "https://www.suse.com/security/cve/CVE-2011-4108" }, { "category": "external", "summary": "SUSE Bug 739719 for CVE-2011-4108", "url": "https://bugzilla.suse.com/739719" }, { "category": "external", "summary": "SUSE Bug 742821 for CVE-2011-4108", "url": "https://bugzilla.suse.com/742821" }, { "category": "external", "summary": "SUSE Bug 758060 for CVE-2011-4108", "url": "https://bugzilla.suse.com/758060" }, { "category": "external", "summary": "SUSE Bug 778825 for CVE-2011-4108", "url": "https://bugzilla.suse.com/778825" }, { "category": "external", "summary": "SUSE Bug 854391 for CVE-2011-4108", "url": "https://bugzilla.suse.com/854391" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-4108" }, { "cve": "CVE-2011-4576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-4576" } ], "notes": [ { "category": "general", "text": "The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-4576", "url": "https://www.suse.com/security/cve/CVE-2011-4576" }, { "category": "external", "summary": "SUSE Bug 739719 for CVE-2011-4576", "url": "https://bugzilla.suse.com/739719" }, { "category": "external", "summary": "SUSE Bug 758060 for CVE-2011-4576", "url": "https://bugzilla.suse.com/758060" }, { "category": "external", "summary": "SUSE Bug 778825 for CVE-2011-4576", "url": "https://bugzilla.suse.com/778825" }, { "category": "external", "summary": "SUSE Bug 854391 for CVE-2011-4576", "url": "https://bugzilla.suse.com/854391" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-4576" }, { "cve": "CVE-2011-4577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-4577" } ], "notes": [ { "category": "general", "text": "OpenSSL before 0.9.8s and 1.x before 1.0.0f, when RFC 3779 support is enabled, allows remote attackers to cause a denial of service (assertion failure) via an X.509 certificate containing certificate-extension data associated with (1) IP address blocks or (2) Autonomous System (AS) identifiers.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-4577", "url": "https://www.suse.com/security/cve/CVE-2011-4577" }, { "category": "external", "summary": "SUSE Bug 739719 for CVE-2011-4577", "url": "https://bugzilla.suse.com/739719" }, { "category": "external", "summary": "SUSE Bug 758060 for CVE-2011-4577", "url": "https://bugzilla.suse.com/758060" }, { "category": "external", "summary": "SUSE Bug 854391 for CVE-2011-4577", "url": "https://bugzilla.suse.com/854391" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-4577" }, { "cve": "CVE-2011-4619", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-4619" } ], "notes": [ { "category": "general", "text": "The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-4619", "url": "https://www.suse.com/security/cve/CVE-2011-4619" }, { "category": "external", "summary": "SUSE Bug 739719 for CVE-2011-4619", "url": "https://bugzilla.suse.com/739719" }, { "category": "external", "summary": "SUSE Bug 758060 for CVE-2011-4619", "url": "https://bugzilla.suse.com/758060" }, { "category": "external", "summary": "SUSE Bug 799454 for CVE-2011-4619", "url": "https://bugzilla.suse.com/799454" }, { "category": "external", "summary": "SUSE Bug 854391 for CVE-2011-4619", "url": "https://bugzilla.suse.com/854391" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-4619" }, { "cve": "CVE-2012-0027", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-0027" } ], "notes": [ { "category": "general", "text": "The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-0027", "url": "https://www.suse.com/security/cve/CVE-2012-0027" }, { "category": "external", "summary": "SUSE Bug 739719 for CVE-2012-0027", "url": "https://bugzilla.suse.com/739719" }, { "category": "external", "summary": "SUSE Bug 854391 for CVE-2012-0027", "url": "https://bugzilla.suse.com/854391" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-0027" }, { "cve": "CVE-2012-0050", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-0050" } ], "notes": [ { "category": "general", "text": "OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS applications, which allows remote attackers to cause a denial of service (crash) via unspecified vectors related to an out-of-bounds read. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4108.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-0050", "url": "https://www.suse.com/security/cve/CVE-2012-0050" }, { "category": "external", "summary": "SUSE Bug 739719 for CVE-2012-0050", "url": "https://bugzilla.suse.com/739719" }, { "category": "external", "summary": "SUSE Bug 742821 for CVE-2012-0050", "url": "https://bugzilla.suse.com/742821" }, { "category": "external", "summary": "SUSE Bug 758060 for CVE-2012-0050", "url": "https://bugzilla.suse.com/758060" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-0050" }, { "cve": "CVE-2012-0884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-0884" } ], "notes": [ { "category": "general", "text": "The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL before 0.9.8u and 1.x before 1.0.0h does not properly restrict certain oracle behavior, which makes it easier for context-dependent attackers to decrypt data via a Million Message Attack (MMA) adaptive chosen ciphertext attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-0884", "url": "https://www.suse.com/security/cve/CVE-2012-0884" }, { "category": "external", "summary": "SUSE Bug 749210 for CVE-2012-0884", "url": "https://bugzilla.suse.com/749210" }, { "category": "external", "summary": "SUSE Bug 749735 for CVE-2012-0884", "url": "https://bugzilla.suse.com/749735" }, { "category": "external", "summary": "SUSE Bug 751977 for CVE-2012-0884", "url": "https://bugzilla.suse.com/751977" }, { "category": "external", "summary": "SUSE Bug 754640 for CVE-2012-0884", "url": "https://bugzilla.suse.com/754640" }, { "category": "external", "summary": "SUSE Bug 761819 for CVE-2012-0884", "url": "https://bugzilla.suse.com/761819" }, { "category": "external", "summary": "SUSE Bug 854391 for CVE-2012-0884", "url": "https://bugzilla.suse.com/854391" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-0884" }, { "cve": "CVE-2012-1165", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1165" } ], "notes": [ { "category": "general", "text": "The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulnerability than CVE-2006-7250.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1165", "url": "https://www.suse.com/security/cve/CVE-2012-1165" }, { "category": "external", "summary": "SUSE Bug 749210 for CVE-2012-1165", "url": "https://bugzilla.suse.com/749210" }, { "category": "external", "summary": "SUSE Bug 749213 for CVE-2012-1165", "url": "https://bugzilla.suse.com/749213" }, { "category": "external", "summary": "SUSE Bug 751946 for CVE-2012-1165", "url": "https://bugzilla.suse.com/751946" }, { "category": "external", "summary": "SUSE Bug 754640 for CVE-2012-1165", "url": "https://bugzilla.suse.com/754640" }, { "category": "external", "summary": "SUSE Bug 854391 for CVE-2012-1165", "url": "https://bugzilla.suse.com/854391" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-1165" }, { "cve": "CVE-2012-2110", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2110" } ], "notes": [ { "category": "general", "text": "The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2110", "url": "https://www.suse.com/security/cve/CVE-2012-2110" }, { "category": "external", "summary": "SUSE Bug 758060 for CVE-2012-2110", "url": "https://bugzilla.suse.com/758060" }, { "category": "external", "summary": "SUSE Bug 778825 for CVE-2012-2110", "url": "https://bugzilla.suse.com/778825" }, { "category": "external", "summary": "SUSE Bug 854391 for CVE-2012-2110", "url": "https://bugzilla.suse.com/854391" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-2110" }, { "cve": "CVE-2012-2686", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2686" } ], "notes": [ { "category": "general", "text": "crypto/evp/e_aes_cbc_hmac_sha1.c in the AES-NI functionality in the TLS 1.1 and 1.2 implementations in OpenSSL 1.0.1 before 1.0.1d allows remote attackers to cause a denial of service (application crash) via crafted CBC data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2686", "url": "https://www.suse.com/security/cve/CVE-2012-2686" }, { "category": "external", "summary": "SUSE Bug 802648 for CVE-2012-2686", "url": "https://bugzilla.suse.com/802648" }, { "category": "external", "summary": "SUSE Bug 854391 for CVE-2012-2686", "url": "https://bugzilla.suse.com/854391" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2686" }, { "cve": "CVE-2012-4929", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-4929" } ], "notes": [ { "category": "general", "text": "The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a \"CRIME\" attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-4929", "url": "https://www.suse.com/security/cve/CVE-2012-4929" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2012-4929", "url": "https://bugzilla.suse.com/1011293" }, { "category": "external", "summary": "SUSE Bug 779952 for CVE-2012-4929", "url": "https://bugzilla.suse.com/779952" }, { "category": "external", "summary": "SUSE Bug 793420 for CVE-2012-4929", "url": "https://bugzilla.suse.com/793420" }, { "category": "external", "summary": "SUSE Bug 803004 for CVE-2012-4929", "url": "https://bugzilla.suse.com/803004" }, { "category": "external", "summary": "SUSE Bug 847895 for CVE-2012-4929", "url": "https://bugzilla.suse.com/847895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2012-4929" }, { "cve": "CVE-2013-0166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0166" } ], "notes": [ { "category": "general", "text": "OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0166", "url": "https://www.suse.com/security/cve/CVE-2013-0166" }, { "category": "external", "summary": "SUSE Bug 802648 for CVE-2013-0166", "url": "https://bugzilla.suse.com/802648" }, { "category": "external", "summary": "SUSE Bug 802746 for CVE-2013-0166", "url": "https://bugzilla.suse.com/802746" }, { "category": "external", "summary": "SUSE Bug 813366 for CVE-2013-0166", "url": "https://bugzilla.suse.com/813366" }, { "category": "external", "summary": "SUSE Bug 821818 for CVE-2013-0166", "url": "https://bugzilla.suse.com/821818" }, { "category": "external", "summary": "SUSE Bug 833408 for CVE-2013-0166", "url": "https://bugzilla.suse.com/833408" }, { "category": "external", "summary": "SUSE Bug 854391 for CVE-2013-0166", "url": "https://bugzilla.suse.com/854391" }, { "category": "external", "summary": "SUSE Bug 905106 for CVE-2013-0166", "url": "https://bugzilla.suse.com/905106" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-0166" }, { "cve": "CVE-2013-0169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0169" } ], "notes": [ { "category": "general", "text": "The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the \"Lucky Thirteen\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0169", "url": "https://www.suse.com/security/cve/CVE-2013-0169" }, { "category": "external", "summary": "SUSE Bug 1070148 for CVE-2013-0169", "url": "https://bugzilla.suse.com/1070148" }, { "category": "external", "summary": "SUSE Bug 1103036 for CVE-2013-0169", "url": "https://bugzilla.suse.com/1103036" }, { "category": "external", "summary": "SUSE Bug 1103597 for CVE-2013-0169", "url": "https://bugzilla.suse.com/1103597" }, { "category": "external", "summary": "SUSE Bug 802184 for CVE-2013-0169", "url": "https://bugzilla.suse.com/802184" }, { "category": "external", "summary": "SUSE Bug 802648 for CVE-2013-0169", "url": "https://bugzilla.suse.com/802648" }, { "category": "external", "summary": "SUSE Bug 802746 for CVE-2013-0169", "url": "https://bugzilla.suse.com/802746" }, { "category": "external", "summary": "SUSE Bug 803379 for CVE-2013-0169", "url": "https://bugzilla.suse.com/803379" }, { "category": "external", "summary": "SUSE Bug 804654 for CVE-2013-0169", "url": "https://bugzilla.suse.com/804654" }, { "category": "external", "summary": "SUSE Bug 809839 for CVE-2013-0169", "url": "https://bugzilla.suse.com/809839" }, { "category": "external", "summary": "SUSE Bug 813366 for CVE-2013-0169", "url": "https://bugzilla.suse.com/813366" }, { "category": "external", "summary": "SUSE Bug 813939 for CVE-2013-0169", "url": "https://bugzilla.suse.com/813939" }, { "category": "external", "summary": "SUSE Bug 821818 for CVE-2013-0169", "url": "https://bugzilla.suse.com/821818" }, { "category": "external", "summary": "SUSE Bug 905106 for CVE-2013-0169", "url": "https://bugzilla.suse.com/905106" }, { "category": "external", "summary": "SUSE Bug 977584 for CVE-2013-0169", "url": "https://bugzilla.suse.com/977584" }, { "category": "external", "summary": "SUSE Bug 977616 for CVE-2013-0169", "url": "https://bugzilla.suse.com/977616" }, { "category": "external", "summary": "SUSE Bug 984977 for CVE-2013-0169", "url": "https://bugzilla.suse.com/984977" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-0169" }, { "cve": "CVE-2013-4353", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4353" } ], "notes": [ { "category": "general", "text": "The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4353", "url": "https://www.suse.com/security/cve/CVE-2013-4353" }, { "category": "external", "summary": "SUSE Bug 857640 for CVE-2013-4353", "url": "https://bugzilla.suse.com/857640" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-4353" }, { "cve": "CVE-2013-6449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6449" } ], "notes": [ { "category": "general", "text": "The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6449", "url": "https://www.suse.com/security/cve/CVE-2013-6449" }, { "category": "external", "summary": "SUSE Bug 856687 for CVE-2013-6449", "url": "https://bugzilla.suse.com/856687" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6449" }, { "cve": "CVE-2013-6450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6450" } ], "notes": [ { "category": "general", "text": "The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6450", "url": "https://www.suse.com/security/cve/CVE-2013-6450" }, { "category": "external", "summary": "SUSE Bug 857203 for CVE-2013-6450", "url": "https://bugzilla.suse.com/857203" }, { "category": "external", "summary": "SUSE Bug 861384 for CVE-2013-6450", "url": "https://bugzilla.suse.com/861384" }, { "category": "external", "summary": "SUSE Bug 986238 for CVE-2013-6450", "url": "https://bugzilla.suse.com/986238" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6450" }, { "cve": "CVE-2014-0076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0076" } ], "notes": [ { "category": "general", "text": "The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0076", "url": "https://www.suse.com/security/cve/CVE-2014-0076" }, { "category": "external", "summary": "SUSE Bug 869945 for CVE-2014-0076", "url": "https://bugzilla.suse.com/869945" }, { "category": "external", "summary": "SUSE Bug 880891 for CVE-2014-0076", "url": "https://bugzilla.suse.com/880891" }, { "category": "external", "summary": "SUSE Bug 883126 for CVE-2014-0076", "url": "https://bugzilla.suse.com/883126" }, { "category": "external", "summary": "SUSE Bug 885777 for CVE-2014-0076", "url": "https://bugzilla.suse.com/885777" }, { "category": "external", "summary": "SUSE Bug 905106 for CVE-2014-0076", "url": "https://bugzilla.suse.com/905106" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2014-0076" }, { "cve": "CVE-2014-0160", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0160" } ], "notes": [ { "category": "general", "text": "The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0160", "url": "https://www.suse.com/security/cve/CVE-2014-0160" }, { "category": "external", "summary": "SUSE Bug 872299 for CVE-2014-0160", "url": "https://bugzilla.suse.com/872299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-0160" }, { "cve": "CVE-2014-0195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0195" } ], "notes": [ { "category": "general", "text": "The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0195", "url": "https://www.suse.com/security/cve/CVE-2014-0195" }, { "category": "external", "summary": "SUSE Bug 880891 for CVE-2014-0195", "url": "https://bugzilla.suse.com/880891" }, { "category": "external", "summary": "SUSE Bug 885777 for CVE-2014-0195", "url": "https://bugzilla.suse.com/885777" }, { "category": "external", "summary": "SUSE Bug 915913 for CVE-2014-0195", "url": "https://bugzilla.suse.com/915913" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-0195" }, { "cve": "CVE-2014-0198", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0198" } ], "notes": [ { "category": "general", "text": "The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0198", "url": "https://www.suse.com/security/cve/CVE-2014-0198" }, { "category": "external", "summary": "SUSE Bug 876282 for CVE-2014-0198", "url": "https://bugzilla.suse.com/876282" }, { "category": "external", "summary": "SUSE Bug 880891 for CVE-2014-0198", "url": "https://bugzilla.suse.com/880891" }, { "category": "external", "summary": "SUSE Bug 885777 for CVE-2014-0198", "url": "https://bugzilla.suse.com/885777" }, { "category": "external", "summary": "SUSE Bug 915913 for CVE-2014-0198", "url": "https://bugzilla.suse.com/915913" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-0198" }, { "cve": "CVE-2014-0221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0221" } ], "notes": [ { "category": "general", "text": "The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0221", "url": "https://www.suse.com/security/cve/CVE-2014-0221" }, { "category": "external", "summary": "SUSE Bug 880891 for CVE-2014-0221", "url": "https://bugzilla.suse.com/880891" }, { "category": "external", "summary": "SUSE Bug 883126 for CVE-2014-0221", "url": "https://bugzilla.suse.com/883126" }, { "category": "external", "summary": "SUSE Bug 885777 for CVE-2014-0221", "url": "https://bugzilla.suse.com/885777" }, { "category": "external", "summary": "SUSE Bug 905106 for CVE-2014-0221", "url": "https://bugzilla.suse.com/905106" }, { "category": "external", "summary": "SUSE Bug 915913 for CVE-2014-0221", "url": "https://bugzilla.suse.com/915913" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-0221" }, { "cve": "CVE-2014-0224", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0224" } ], "notes": [ { "category": "general", "text": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0224", "url": "https://www.suse.com/security/cve/CVE-2014-0224" }, { "category": "external", "summary": "SUSE Bug 1146657 for CVE-2014-0224", "url": "https://bugzilla.suse.com/1146657" }, { "category": "external", "summary": "SUSE Bug 880891 for CVE-2014-0224", "url": "https://bugzilla.suse.com/880891" }, { "category": "external", "summary": "SUSE Bug 881743 for CVE-2014-0224", "url": "https://bugzilla.suse.com/881743" }, { "category": "external", "summary": "SUSE Bug 883126 for CVE-2014-0224", "url": "https://bugzilla.suse.com/883126" }, { "category": "external", "summary": "SUSE Bug 885777 for CVE-2014-0224", "url": "https://bugzilla.suse.com/885777" }, { "category": "external", "summary": "SUSE Bug 892403 for CVE-2014-0224", "url": "https://bugzilla.suse.com/892403" }, { "category": "external", "summary": "SUSE Bug 901237 for CVE-2014-0224", "url": "https://bugzilla.suse.com/901237" }, { "category": "external", "summary": "SUSE Bug 903703 for CVE-2014-0224", "url": "https://bugzilla.suse.com/903703" }, { "category": "external", "summary": "SUSE Bug 905018 for CVE-2014-0224", "url": "https://bugzilla.suse.com/905018" }, { "category": "external", "summary": "SUSE Bug 905106 for CVE-2014-0224", "url": "https://bugzilla.suse.com/905106" }, { "category": "external", "summary": "SUSE Bug 914447 for CVE-2014-0224", "url": "https://bugzilla.suse.com/914447" }, { "category": "external", "summary": "SUSE Bug 915913 for CVE-2014-0224", "url": "https://bugzilla.suse.com/915913" }, { "category": "external", "summary": "SUSE Bug 916239 for CVE-2014-0224", "url": "https://bugzilla.suse.com/916239" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-0224" }, { "cve": "CVE-2014-3470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3470" } ], "notes": [ { "category": "general", "text": "The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3470", "url": "https://www.suse.com/security/cve/CVE-2014-3470" }, { "category": "external", "summary": "SUSE Bug 880891 for CVE-2014-3470", "url": "https://bugzilla.suse.com/880891" }, { "category": "external", "summary": "SUSE Bug 883126 for CVE-2014-3470", "url": "https://bugzilla.suse.com/883126" }, { "category": "external", "summary": "SUSE Bug 885777 for CVE-2014-3470", "url": "https://bugzilla.suse.com/885777" }, { "category": "external", "summary": "SUSE Bug 905106 for CVE-2014-3470", "url": "https://bugzilla.suse.com/905106" }, { "category": "external", "summary": "SUSE Bug 915913 for CVE-2014-3470", "url": "https://bugzilla.suse.com/915913" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3470" }, { "cve": "CVE-2014-3505", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3505" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3505", "url": "https://www.suse.com/security/cve/CVE-2014-3505" }, { "category": "external", "summary": "SUSE Bug 890759 for CVE-2014-3505", "url": "https://bugzilla.suse.com/890759" }, { "category": "external", "summary": "SUSE Bug 890764 for CVE-2014-3505", "url": "https://bugzilla.suse.com/890764" }, { "category": "external", "summary": "SUSE Bug 890767 for CVE-2014-3505", "url": "https://bugzilla.suse.com/890767" }, { "category": "external", "summary": "SUSE Bug 905106 for CVE-2014-3505", "url": "https://bugzilla.suse.com/905106" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-3505" }, { "cve": "CVE-2014-3506", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3506" } ], "notes": [ { "category": "general", "text": "d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3506", "url": "https://www.suse.com/security/cve/CVE-2014-3506" }, { "category": "external", "summary": "SUSE Bug 890759 for CVE-2014-3506", "url": "https://bugzilla.suse.com/890759" }, { "category": "external", "summary": "SUSE Bug 890764 for CVE-2014-3506", "url": "https://bugzilla.suse.com/890764" }, { "category": "external", "summary": "SUSE Bug 890768 for CVE-2014-3506", "url": "https://bugzilla.suse.com/890768" }, { "category": "external", "summary": "SUSE Bug 905106 for CVE-2014-3506", "url": "https://bugzilla.suse.com/905106" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-3506" }, { "cve": "CVE-2014-3507", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3507" } ], "notes": [ { "category": "general", "text": "Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3507", "url": "https://www.suse.com/security/cve/CVE-2014-3507" }, { "category": "external", "summary": "SUSE Bug 890759 for CVE-2014-3507", "url": "https://bugzilla.suse.com/890759" }, { "category": "external", "summary": "SUSE Bug 890764 for CVE-2014-3507", "url": "https://bugzilla.suse.com/890764" }, { "category": "external", "summary": "SUSE Bug 890769 for CVE-2014-3507", "url": "https://bugzilla.suse.com/890769" }, { "category": "external", "summary": "SUSE Bug 905106 for CVE-2014-3507", "url": "https://bugzilla.suse.com/905106" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-3507" }, { "cve": "CVE-2014-3508", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3508" } ], "notes": [ { "category": "general", "text": "The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of \u0027\\0\u0027 characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3508", "url": "https://www.suse.com/security/cve/CVE-2014-3508" }, { "category": "external", "summary": "SUSE Bug 890759 for CVE-2014-3508", "url": "https://bugzilla.suse.com/890759" }, { "category": "external", "summary": "SUSE Bug 890764 for CVE-2014-3508", "url": "https://bugzilla.suse.com/890764" }, { "category": "external", "summary": "SUSE Bug 905106 for CVE-2014-3508", "url": "https://bugzilla.suse.com/905106" }, { "category": "external", "summary": "SUSE Bug 950708 for CVE-2014-3508", "url": "https://bugzilla.suse.com/950708" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-3508" }, { "cve": "CVE-2014-3509", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3509" } ], "notes": [ { "category": "general", "text": "Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3509", "url": "https://www.suse.com/security/cve/CVE-2014-3509" }, { "category": "external", "summary": "SUSE Bug 890759 for CVE-2014-3509", "url": "https://bugzilla.suse.com/890759" }, { "category": "external", "summary": "SUSE Bug 890766 for CVE-2014-3509", "url": "https://bugzilla.suse.com/890766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-3509" }, { "cve": "CVE-2014-3510", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3510" } ], "notes": [ { "category": "general", "text": "The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3510", "url": "https://www.suse.com/security/cve/CVE-2014-3510" }, { "category": "external", "summary": "SUSE Bug 890759 for CVE-2014-3510", "url": "https://bugzilla.suse.com/890759" }, { "category": "external", "summary": "SUSE Bug 890764 for CVE-2014-3510", "url": "https://bugzilla.suse.com/890764" }, { "category": "external", "summary": "SUSE Bug 890770 for CVE-2014-3510", "url": "https://bugzilla.suse.com/890770" }, { "category": "external", "summary": "SUSE Bug 905106 for CVE-2014-3510", "url": "https://bugzilla.suse.com/905106" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-3510" }, { "cve": "CVE-2014-3511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3511" } ], "notes": [ { "category": "general", "text": "The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a \"protocol downgrade\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3511", "url": "https://www.suse.com/security/cve/CVE-2014-3511" }, { "category": "external", "summary": "SUSE Bug 890759 for CVE-2014-3511", "url": "https://bugzilla.suse.com/890759" }, { "category": "external", "summary": "SUSE Bug 890771 for CVE-2014-3511", "url": "https://bugzilla.suse.com/890771" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-3511" }, { "cve": "CVE-2014-3512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3512" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3512", "url": "https://www.suse.com/security/cve/CVE-2014-3512" }, { "category": "external", "summary": "SUSE Bug 890759 for CVE-2014-3512", "url": "https://bugzilla.suse.com/890759" }, { "category": "external", "summary": "SUSE Bug 890772 for CVE-2014-3512", "url": "https://bugzilla.suse.com/890772" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-3512" }, { "cve": "CVE-2014-3513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3513" } ], "notes": [ { "category": "general", "text": "Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3513", "url": "https://www.suse.com/security/cve/CVE-2014-3513" }, { "category": "external", "summary": "SUSE Bug 901277 for CVE-2014-3513", "url": "https://bugzilla.suse.com/901277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3513" }, { "cve": "CVE-2014-3567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3567" } ], "notes": [ { "category": "general", "text": "Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3567", "url": "https://www.suse.com/security/cve/CVE-2014-3567" }, { "category": "external", "summary": "SUSE Bug 877506 for CVE-2014-3567", "url": "https://bugzilla.suse.com/877506" }, { "category": "external", "summary": "SUSE Bug 901277 for CVE-2014-3567", "url": "https://bugzilla.suse.com/901277" }, { "category": "external", "summary": "SUSE Bug 905106 for CVE-2014-3567", "url": "https://bugzilla.suse.com/905106" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-3567" }, { "cve": "CVE-2014-3568", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3568" } ], "notes": [ { "category": "general", "text": "OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3568", "url": "https://www.suse.com/security/cve/CVE-2014-3568" }, { "category": "external", "summary": "SUSE Bug 901277 for CVE-2014-3568", "url": "https://bugzilla.suse.com/901277" }, { "category": "external", "summary": "SUSE Bug 905106 for CVE-2014-3568", "url": "https://bugzilla.suse.com/905106" }, { "category": "external", "summary": "SUSE Bug 911399 for CVE-2014-3568", "url": "https://bugzilla.suse.com/911399" }, { "category": "external", "summary": "SUSE Bug 986238 for CVE-2014-3568", "url": "https://bugzilla.suse.com/986238" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3568" }, { "cve": "CVE-2014-3569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3569" } ], "notes": [ { "category": "general", "text": "The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling. NOTE: this issue became relevant after the CVE-2014-3568 fix.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3569", "url": "https://www.suse.com/security/cve/CVE-2014-3569" }, { "category": "external", "summary": "SUSE Bug 911399 for CVE-2014-3569", "url": "https://bugzilla.suse.com/911399" }, { "category": "external", "summary": "SUSE Bug 927623 for CVE-2014-3569", "url": "https://bugzilla.suse.com/927623" }, { "category": "external", "summary": "SUSE Bug 986238 for CVE-2014-3569", "url": "https://bugzilla.suse.com/986238" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3569" }, { "cve": "CVE-2014-3570", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3570" } ], "notes": [ { "category": "general", "text": "The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3570", "url": "https://www.suse.com/security/cve/CVE-2014-3570" }, { "category": "external", "summary": "SUSE Bug 912296 for CVE-2014-3570", "url": "https://bugzilla.suse.com/912296" }, { "category": "external", "summary": "SUSE Bug 915848 for CVE-2014-3570", "url": "https://bugzilla.suse.com/915848" }, { "category": "external", "summary": "SUSE Bug 927623 for CVE-2014-3570", "url": "https://bugzilla.suse.com/927623" }, { "category": "external", "summary": "SUSE Bug 937891 for CVE-2014-3570", "url": "https://bugzilla.suse.com/937891" }, { "category": "external", "summary": "SUSE Bug 944456 for CVE-2014-3570", "url": "https://bugzilla.suse.com/944456" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3570" }, { "cve": "CVE-2014-3571", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3571" } ], "notes": [ { "category": "general", "text": "OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3571", "url": "https://www.suse.com/security/cve/CVE-2014-3571" }, { "category": "external", "summary": "SUSE Bug 912294 for CVE-2014-3571", "url": "https://bugzilla.suse.com/912294" }, { "category": "external", "summary": "SUSE Bug 915848 for CVE-2014-3571", "url": "https://bugzilla.suse.com/915848" }, { "category": "external", "summary": "SUSE Bug 927623 for CVE-2014-3571", "url": "https://bugzilla.suse.com/927623" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3571" }, { "cve": "CVE-2014-3572", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3572" } ], "notes": [ { "category": "general", "text": "The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3572", "url": "https://www.suse.com/security/cve/CVE-2014-3572" }, { "category": "external", "summary": "SUSE Bug 912015 for CVE-2014-3572", "url": "https://bugzilla.suse.com/912015" }, { "category": "external", "summary": "SUSE Bug 915848 for CVE-2014-3572", "url": "https://bugzilla.suse.com/915848" }, { "category": "external", "summary": "SUSE Bug 927623 for CVE-2014-3572", "url": "https://bugzilla.suse.com/927623" }, { "category": "external", "summary": "SUSE Bug 937891 for CVE-2014-3572", "url": "https://bugzilla.suse.com/937891" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3572" }, { "cve": "CVE-2014-5139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-5139" } ], "notes": [ { "category": "general", "text": "The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-5139", "url": "https://www.suse.com/security/cve/CVE-2014-5139" }, { "category": "external", "summary": "SUSE Bug 886831 for CVE-2014-5139", "url": "https://bugzilla.suse.com/886831" }, { "category": "external", "summary": "SUSE Bug 890759 for CVE-2014-5139", "url": "https://bugzilla.suse.com/890759" }, { "category": "external", "summary": "SUSE Bug 890765 for CVE-2014-5139", "url": "https://bugzilla.suse.com/890765" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-5139" }, { "cve": "CVE-2014-8275", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8275" } ], "notes": [ { "category": "general", "text": "OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate\u0027s unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8275", "url": "https://www.suse.com/security/cve/CVE-2014-8275" }, { "category": "external", "summary": "SUSE Bug 912018 for CVE-2014-8275", "url": "https://bugzilla.suse.com/912018" }, { "category": "external", "summary": "SUSE Bug 915848 for CVE-2014-8275", "url": "https://bugzilla.suse.com/915848" }, { "category": "external", "summary": "SUSE Bug 927623 for CVE-2014-8275", "url": "https://bugzilla.suse.com/927623" }, { "category": "external", "summary": "SUSE Bug 937891 for CVE-2014-8275", "url": "https://bugzilla.suse.com/937891" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-8275" }, { "cve": "CVE-2015-0204", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0204" } ], "notes": [ { "category": "general", "text": "The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the \"FREAK\" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0204", "url": "https://www.suse.com/security/cve/CVE-2015-0204" }, { "category": "external", "summary": "SUSE Bug 912014 for CVE-2015-0204", "url": "https://bugzilla.suse.com/912014" }, { "category": "external", "summary": "SUSE Bug 920482 for CVE-2015-0204", "url": "https://bugzilla.suse.com/920482" }, { "category": "external", "summary": "SUSE Bug 920484 for CVE-2015-0204", "url": "https://bugzilla.suse.com/920484" }, { "category": "external", "summary": "SUSE Bug 927591 for CVE-2015-0204", "url": "https://bugzilla.suse.com/927591" }, { "category": "external", "summary": "SUSE Bug 927623 for CVE-2015-0204", "url": "https://bugzilla.suse.com/927623" }, { "category": "external", "summary": "SUSE Bug 936787 for CVE-2015-0204", "url": "https://bugzilla.suse.com/936787" }, { "category": "external", "summary": "SUSE Bug 952088 for CVE-2015-0204", "url": "https://bugzilla.suse.com/952088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-0204" }, { "cve": "CVE-2015-0205", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0205" } ], "notes": [ { "category": "general", "text": "The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0205", "url": "https://www.suse.com/security/cve/CVE-2015-0205" }, { "category": "external", "summary": "SUSE Bug 912293 for CVE-2015-0205", "url": "https://bugzilla.suse.com/912293" }, { "category": "external", "summary": "SUSE Bug 915848 for CVE-2015-0205", "url": "https://bugzilla.suse.com/915848" }, { "category": "external", "summary": "SUSE Bug 927623 for CVE-2015-0205", "url": "https://bugzilla.suse.com/927623" }, { "category": "external", "summary": "SUSE Bug 937891 for CVE-2015-0205", "url": "https://bugzilla.suse.com/937891" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-0205" }, { "cve": "CVE-2015-0206", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0206" } ], "notes": [ { "category": "general", "text": "Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0206", "url": "https://www.suse.com/security/cve/CVE-2015-0206" }, { "category": "external", "summary": "SUSE Bug 912292 for CVE-2015-0206", "url": "https://bugzilla.suse.com/912292" }, { "category": "external", "summary": "SUSE Bug 927623 for CVE-2015-0206", "url": "https://bugzilla.suse.com/927623" }, { "category": "external", "summary": "SUSE Bug 937891 for CVE-2015-0206", "url": "https://bugzilla.suse.com/937891" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-0206" }, { "cve": "CVE-2015-0209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0209" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0209", "url": "https://www.suse.com/security/cve/CVE-2015-0209" }, { "category": "external", "summary": "SUSE Bug 912014 for CVE-2015-0209", "url": "https://bugzilla.suse.com/912014" }, { "category": "external", "summary": "SUSE Bug 919648 for CVE-2015-0209", "url": "https://bugzilla.suse.com/919648" }, { "category": "external", "summary": "SUSE Bug 936586 for CVE-2015-0209", "url": "https://bugzilla.suse.com/936586" }, { "category": "external", "summary": "SUSE Bug 937891 for CVE-2015-0209", "url": "https://bugzilla.suse.com/937891" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-0209" }, { "cve": "CVE-2015-0286", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0286" } ], "notes": [ { "category": "general", "text": "The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0286", "url": "https://www.suse.com/security/cve/CVE-2015-0286" }, { "category": "external", "summary": "SUSE Bug 912014 for CVE-2015-0286", "url": "https://bugzilla.suse.com/912014" }, { "category": "external", "summary": "SUSE Bug 919648 for CVE-2015-0286", "url": "https://bugzilla.suse.com/919648" }, { "category": "external", "summary": "SUSE Bug 922496 for CVE-2015-0286", "url": "https://bugzilla.suse.com/922496" }, { "category": "external", "summary": "SUSE Bug 936586 for CVE-2015-0286", "url": "https://bugzilla.suse.com/936586" }, { "category": "external", "summary": "SUSE Bug 937891 for CVE-2015-0286", "url": "https://bugzilla.suse.com/937891" }, { "category": "external", "summary": "SUSE Bug 951391 for CVE-2015-0286", "url": "https://bugzilla.suse.com/951391" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-0286" }, { "cve": "CVE-2015-0287", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0287" } ], "notes": [ { "category": "general", "text": "The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0287", "url": "https://www.suse.com/security/cve/CVE-2015-0287" }, { "category": "external", "summary": "SUSE Bug 912014 for CVE-2015-0287", "url": "https://bugzilla.suse.com/912014" }, { "category": "external", "summary": "SUSE Bug 919648 for CVE-2015-0287", "url": "https://bugzilla.suse.com/919648" }, { "category": "external", "summary": "SUSE Bug 922499 for CVE-2015-0287", "url": "https://bugzilla.suse.com/922499" }, { "category": "external", "summary": "SUSE Bug 936586 for CVE-2015-0287", "url": "https://bugzilla.suse.com/936586" }, { "category": "external", "summary": "SUSE Bug 937891 for CVE-2015-0287", "url": "https://bugzilla.suse.com/937891" }, { "category": "external", "summary": "SUSE Bug 968888 for CVE-2015-0287", "url": "https://bugzilla.suse.com/968888" }, { "category": "external", "summary": "SUSE Bug 991722 for CVE-2015-0287", "url": "https://bugzilla.suse.com/991722" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-0287" }, { "cve": "CVE-2015-0288", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0288" } ], "notes": [ { "category": "general", "text": "The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0288", "url": "https://www.suse.com/security/cve/CVE-2015-0288" }, { "category": "external", "summary": "SUSE Bug 912014 for CVE-2015-0288", "url": "https://bugzilla.suse.com/912014" }, { "category": "external", "summary": "SUSE Bug 919648 for CVE-2015-0288", "url": "https://bugzilla.suse.com/919648" }, { "category": "external", "summary": "SUSE Bug 920236 for CVE-2015-0288", "url": "https://bugzilla.suse.com/920236" }, { "category": "external", "summary": "SUSE Bug 936586 for CVE-2015-0288", "url": "https://bugzilla.suse.com/936586" }, { "category": "external", "summary": "SUSE Bug 937891 for CVE-2015-0288", "url": "https://bugzilla.suse.com/937891" }, { "category": "external", "summary": "SUSE Bug 951391 for CVE-2015-0288", "url": "https://bugzilla.suse.com/951391" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-0288" }, { "cve": "CVE-2015-0289", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0289" } ], "notes": [ { "category": "general", "text": "The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0289", "url": "https://www.suse.com/security/cve/CVE-2015-0289" }, { "category": "external", "summary": "SUSE Bug 912014 for CVE-2015-0289", "url": "https://bugzilla.suse.com/912014" }, { "category": "external", "summary": "SUSE Bug 919648 for CVE-2015-0289", "url": "https://bugzilla.suse.com/919648" }, { "category": "external", "summary": "SUSE Bug 922500 for CVE-2015-0289", "url": "https://bugzilla.suse.com/922500" }, { "category": "external", "summary": "SUSE Bug 936586 for CVE-2015-0289", "url": "https://bugzilla.suse.com/936586" }, { "category": "external", "summary": "SUSE Bug 937891 for CVE-2015-0289", "url": "https://bugzilla.suse.com/937891" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-0289" }, { "cve": "CVE-2015-0293", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0293" } ], "notes": [ { "category": "general", "text": "The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0293", "url": "https://www.suse.com/security/cve/CVE-2015-0293" }, { "category": "external", "summary": "SUSE Bug 912014 for CVE-2015-0293", "url": "https://bugzilla.suse.com/912014" }, { "category": "external", "summary": "SUSE Bug 919648 for CVE-2015-0293", "url": "https://bugzilla.suse.com/919648" }, { "category": "external", "summary": "SUSE Bug 922488 for CVE-2015-0293", "url": "https://bugzilla.suse.com/922488" }, { "category": "external", "summary": "SUSE Bug 936586 for CVE-2015-0293", "url": "https://bugzilla.suse.com/936586" }, { "category": "external", "summary": "SUSE Bug 968044 for CVE-2015-0293", "url": "https://bugzilla.suse.com/968044" }, { "category": "external", "summary": "SUSE Bug 968051 for CVE-2015-0293", "url": "https://bugzilla.suse.com/968051" }, { "category": "external", "summary": "SUSE Bug 968053 for CVE-2015-0293", "url": "https://bugzilla.suse.com/968053" }, { "category": "external", "summary": "SUSE Bug 986238 for CVE-2015-0293", "url": "https://bugzilla.suse.com/986238" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-0293" }, { "cve": "CVE-2015-1788", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1788" } ], "notes": [ { "category": "general", "text": "The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1788", "url": "https://www.suse.com/security/cve/CVE-2015-1788" }, { "category": "external", "summary": "SUSE Bug 934487 for CVE-2015-1788", "url": "https://bugzilla.suse.com/934487" }, { "category": "external", "summary": "SUSE Bug 934666 for CVE-2015-1788", "url": "https://bugzilla.suse.com/934666" }, { "category": "external", "summary": "SUSE Bug 936586 for CVE-2015-1788", "url": "https://bugzilla.suse.com/936586" }, { "category": "external", "summary": "SUSE Bug 937891 for CVE-2015-1788", "url": "https://bugzilla.suse.com/937891" }, { "category": "external", "summary": "SUSE Bug 938432 for CVE-2015-1788", "url": "https://bugzilla.suse.com/938432" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1788" }, { "cve": "CVE-2015-1789", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1789" } ], "notes": [ { "category": "general", "text": "The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1789", "url": "https://www.suse.com/security/cve/CVE-2015-1789" }, { "category": "external", "summary": "SUSE Bug 934489 for CVE-2015-1789", "url": "https://bugzilla.suse.com/934489" }, { "category": "external", "summary": "SUSE Bug 934666 for CVE-2015-1789", "url": "https://bugzilla.suse.com/934666" }, { "category": "external", "summary": "SUSE Bug 936586 for CVE-2015-1789", "url": "https://bugzilla.suse.com/936586" }, { "category": "external", "summary": "SUSE Bug 937891 for CVE-2015-1789", "url": "https://bugzilla.suse.com/937891" }, { "category": "external", "summary": "SUSE Bug 938432 for CVE-2015-1789", "url": "https://bugzilla.suse.com/938432" }, { "category": "external", "summary": "SUSE Bug 951391 for CVE-2015-1789", "url": "https://bugzilla.suse.com/951391" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1789" }, { "cve": "CVE-2015-1790", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1790" } ], "notes": [ { "category": "general", "text": "The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1790", "url": "https://www.suse.com/security/cve/CVE-2015-1790" }, { "category": "external", "summary": "SUSE Bug 934491 for CVE-2015-1790", "url": "https://bugzilla.suse.com/934491" }, { "category": "external", "summary": "SUSE Bug 934666 for CVE-2015-1790", "url": "https://bugzilla.suse.com/934666" }, { "category": "external", "summary": "SUSE Bug 936586 for CVE-2015-1790", "url": "https://bugzilla.suse.com/936586" }, { "category": "external", "summary": "SUSE Bug 938432 for CVE-2015-1790", "url": "https://bugzilla.suse.com/938432" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1790" }, { "cve": "CVE-2015-1791", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1791" } ], "notes": [ { "category": "general", "text": "Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1791", "url": "https://www.suse.com/security/cve/CVE-2015-1791" }, { "category": "external", "summary": "SUSE Bug 933911 for CVE-2015-1791", "url": "https://bugzilla.suse.com/933911" }, { "category": "external", "summary": "SUSE Bug 934666 for CVE-2015-1791", "url": "https://bugzilla.suse.com/934666" }, { "category": "external", "summary": "SUSE Bug 986238 for CVE-2015-1791", "url": "https://bugzilla.suse.com/986238" }, { "category": "external", "summary": "SUSE Bug 989464 for CVE-2015-1791", "url": "https://bugzilla.suse.com/989464" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1791" }, { "cve": "CVE-2015-1792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1792" } ], "notes": [ { "category": "general", "text": "The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1792", "url": "https://www.suse.com/security/cve/CVE-2015-1792" }, { "category": "external", "summary": "SUSE Bug 934493 for CVE-2015-1792", "url": "https://bugzilla.suse.com/934493" }, { "category": "external", "summary": "SUSE Bug 934666 for CVE-2015-1792", "url": "https://bugzilla.suse.com/934666" }, { "category": "external", "summary": "SUSE Bug 937891 for CVE-2015-1792", "url": "https://bugzilla.suse.com/937891" }, { "category": "external", "summary": "SUSE Bug 986238 for CVE-2015-1792", "url": "https://bugzilla.suse.com/986238" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1792" }, { "cve": "CVE-2015-1793", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1793" } ], "notes": [ { "category": "general", "text": "The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1793", "url": "https://www.suse.com/security/cve/CVE-2015-1793" }, { "category": "external", "summary": "SUSE Bug 936746 for CVE-2015-1793", "url": "https://bugzilla.suse.com/936746" }, { "category": "external", "summary": "SUSE Bug 937637 for CVE-2015-1793", "url": "https://bugzilla.suse.com/937637" }, { "category": "external", "summary": "SUSE Bug 951391 for CVE-2015-1793", "url": "https://bugzilla.suse.com/951391" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1793" }, { "cve": "CVE-2015-1794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1794" } ], "notes": [ { "category": "general", "text": "The ssl3_get_key_exchange function in ssl/s3_clnt.c in OpenSSL 1.0.2 before 1.0.2e allows remote servers to cause a denial of service (segmentation fault) via a zero p value in an anonymous Diffie-Hellman (DH) ServerKeyExchange message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1794", "url": "https://www.suse.com/security/cve/CVE-2015-1794" }, { "category": "external", "summary": "SUSE Bug 957984 for CVE-2015-1794", "url": "https://bugzilla.suse.com/957984" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-1794" }, { "cve": "CVE-2015-3193", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3193" } ], "notes": [ { "category": "general", "text": "The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3193", "url": "https://www.suse.com/security/cve/CVE-2015-3193" }, { "category": "external", "summary": "SUSE Bug 1022086 for CVE-2015-3193", "url": "https://bugzilla.suse.com/1022086" }, { "category": "external", "summary": "SUSE Bug 1066242 for CVE-2015-3193", "url": "https://bugzilla.suse.com/1066242" }, { "category": "external", "summary": "SUSE Bug 1071906 for CVE-2015-3193", "url": "https://bugzilla.suse.com/1071906" }, { "category": "external", "summary": "SUSE Bug 957814 for CVE-2015-3193", "url": "https://bugzilla.suse.com/957814" }, { "category": "external", "summary": "SUSE Bug 960151 for CVE-2015-3193", "url": "https://bugzilla.suse.com/960151" }, { "category": "external", "summary": "SUSE Bug 990370 for CVE-2015-3193", "url": "https://bugzilla.suse.com/990370" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-3193" }, { "cve": "CVE-2015-3194", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3194" } ], "notes": [ { "category": "general", "text": "crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3194", "url": "https://www.suse.com/security/cve/CVE-2015-3194" }, { "category": "external", "summary": "SUSE Bug 957812 for CVE-2015-3194", "url": "https://bugzilla.suse.com/957812" }, { "category": "external", "summary": "SUSE Bug 957815 for CVE-2015-3194", "url": "https://bugzilla.suse.com/957815" }, { "category": "external", "summary": "SUSE Bug 958768 for CVE-2015-3194", "url": "https://bugzilla.suse.com/958768" }, { "category": "external", "summary": "SUSE Bug 976341 for CVE-2015-3194", "url": "https://bugzilla.suse.com/976341" }, { "category": "external", "summary": "SUSE Bug 990370 for CVE-2015-3194", "url": "https://bugzilla.suse.com/990370" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-3194" }, { "cve": "CVE-2015-3195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3195" } ], "notes": [ { "category": "general", "text": "The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3195", "url": "https://www.suse.com/security/cve/CVE-2015-3195" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-3195", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 957812 for CVE-2015-3195", "url": "https://bugzilla.suse.com/957812" }, { "category": "external", "summary": "SUSE Bug 957815 for CVE-2015-3195", "url": "https://bugzilla.suse.com/957815" }, { "category": "external", "summary": "SUSE Bug 958768 for CVE-2015-3195", "url": "https://bugzilla.suse.com/958768" }, { "category": "external", "summary": "SUSE Bug 963977 for CVE-2015-3195", "url": "https://bugzilla.suse.com/963977" }, { "category": "external", "summary": "SUSE Bug 986238 for CVE-2015-3195", "url": "https://bugzilla.suse.com/986238" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-3195" }, { "cve": "CVE-2015-3196", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3196" } ], "notes": [ { "category": "general", "text": "ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3196", "url": "https://www.suse.com/security/cve/CVE-2015-3196" }, { "category": "external", "summary": "SUSE Bug 957813 for CVE-2015-3196", "url": "https://bugzilla.suse.com/957813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-3196" }, { "cve": "CVE-2015-3197", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3197" } ], "notes": [ { "category": "general", "text": "ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3197", "url": "https://www.suse.com/security/cve/CVE-2015-3197" }, { "category": "external", "summary": "SUSE Bug 963410 for CVE-2015-3197", "url": "https://bugzilla.suse.com/963410" }, { "category": "external", "summary": "SUSE Bug 963415 for CVE-2015-3197", "url": "https://bugzilla.suse.com/963415" }, { "category": "external", "summary": "SUSE Bug 968044 for CVE-2015-3197", "url": "https://bugzilla.suse.com/968044" }, { "category": "external", "summary": "SUSE Bug 968046 for CVE-2015-3197", "url": "https://bugzilla.suse.com/968046" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-3197" }, { "cve": "CVE-2016-0701", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0701" } ], "notes": [ { "category": "general", "text": "The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0701", "url": "https://www.suse.com/security/cve/CVE-2016-0701" }, { "category": "external", "summary": "SUSE Bug 1071906 for CVE-2016-0701", "url": "https://bugzilla.suse.com/1071906" }, { "category": "external", "summary": "SUSE Bug 1176331 for CVE-2016-0701", "url": "https://bugzilla.suse.com/1176331" }, { "category": "external", "summary": "SUSE Bug 1195379 for CVE-2016-0701", "url": "https://bugzilla.suse.com/1195379" }, { "category": "external", "summary": "SUSE Bug 963410 for CVE-2016-0701", "url": "https://bugzilla.suse.com/963410" }, { "category": "external", "summary": "SUSE Bug 963413 for CVE-2016-0701", "url": "https://bugzilla.suse.com/963413" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-0701" }, { "cve": "CVE-2016-0702", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0702" } ], "notes": [ { "category": "general", "text": "The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a \"CacheBleed\" attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0702", "url": "https://www.suse.com/security/cve/CVE-2016-0702" }, { "category": "external", "summary": "SUSE Bug 1007806 for CVE-2016-0702", "url": "https://bugzilla.suse.com/1007806" }, { "category": "external", "summary": "SUSE Bug 968044 for CVE-2016-0702", "url": "https://bugzilla.suse.com/968044" }, { "category": "external", "summary": "SUSE Bug 968050 for CVE-2016-0702", "url": "https://bugzilla.suse.com/968050" }, { "category": "external", "summary": "SUSE Bug 971238 for CVE-2016-0702", "url": "https://bugzilla.suse.com/971238" }, { "category": "external", "summary": "SUSE Bug 990370 for CVE-2016-0702", "url": "https://bugzilla.suse.com/990370" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-0702" }, { "cve": "CVE-2016-0705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0705" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0705", "url": "https://www.suse.com/security/cve/CVE-2016-0705" }, { "category": "external", "summary": "SUSE Bug 968044 for CVE-2016-0705", "url": "https://bugzilla.suse.com/968044" }, { "category": "external", "summary": "SUSE Bug 968047 for CVE-2016-0705", "url": "https://bugzilla.suse.com/968047" }, { "category": "external", "summary": "SUSE Bug 971238 for CVE-2016-0705", "url": "https://bugzilla.suse.com/971238" }, { "category": "external", "summary": "SUSE Bug 976341 for CVE-2016-0705", "url": "https://bugzilla.suse.com/976341" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-0705" }, { "cve": "CVE-2016-0797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0797" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0797", "url": "https://www.suse.com/security/cve/CVE-2016-0797" }, { "category": "external", "summary": "SUSE Bug 968044 for CVE-2016-0797", "url": "https://bugzilla.suse.com/968044" }, { "category": "external", "summary": "SUSE Bug 968048 for CVE-2016-0797", "url": "https://bugzilla.suse.com/968048" }, { "category": "external", "summary": "SUSE Bug 990370 for CVE-2016-0797", "url": "https://bugzilla.suse.com/990370" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-0797" }, { "cve": "CVE-2016-0798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0798" } ], "notes": [ { "category": "general", "text": "Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0798", "url": "https://www.suse.com/security/cve/CVE-2016-0798" }, { "category": "external", "summary": "SUSE Bug 968044 for CVE-2016-0798", "url": "https://bugzilla.suse.com/968044" }, { "category": "external", "summary": "SUSE Bug 968265 for CVE-2016-0798", "url": "https://bugzilla.suse.com/968265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-0798" }, { "cve": "CVE-2016-0800", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0800" } ], "notes": [ { "category": "general", "text": "The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a \"DROWN\" attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0800", "url": "https://www.suse.com/security/cve/CVE-2016-0800" }, { "category": "external", "summary": "SUSE Bug 1106871 for CVE-2016-0800", "url": "https://bugzilla.suse.com/1106871" }, { "category": "external", "summary": "SUSE Bug 961377 for CVE-2016-0800", "url": "https://bugzilla.suse.com/961377" }, { "category": "external", "summary": "SUSE Bug 968044 for CVE-2016-0800", "url": "https://bugzilla.suse.com/968044" }, { "category": "external", "summary": "SUSE Bug 968046 for CVE-2016-0800", "url": "https://bugzilla.suse.com/968046" }, { "category": "external", "summary": "SUSE Bug 968888 for CVE-2016-0800", "url": "https://bugzilla.suse.com/968888" }, { "category": "external", "summary": "SUSE Bug 969591 for CVE-2016-0800", "url": "https://bugzilla.suse.com/969591" }, { "category": "external", "summary": "SUSE Bug 979060 for CVE-2016-0800", "url": "https://bugzilla.suse.com/979060" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-0800" }, { "cve": "CVE-2016-2105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2105" } ], "notes": [ { "category": "general", "text": "Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2105", "url": "https://www.suse.com/security/cve/CVE-2016-2105" }, { "category": "external", "summary": "SUSE Bug 977584 for CVE-2016-2105", "url": "https://bugzilla.suse.com/977584" }, { "category": "external", "summary": "SUSE Bug 977614 for CVE-2016-2105", "url": "https://bugzilla.suse.com/977614" }, { "category": "external", "summary": "SUSE Bug 978492 for CVE-2016-2105", "url": "https://bugzilla.suse.com/978492" }, { "category": "external", "summary": "SUSE Bug 989902 for CVE-2016-2105", "url": "https://bugzilla.suse.com/989902" }, { "category": "external", "summary": "SUSE Bug 990369 for CVE-2016-2105", "url": "https://bugzilla.suse.com/990369" }, { "category": "external", "summary": "SUSE Bug 990370 for CVE-2016-2105", "url": "https://bugzilla.suse.com/990370" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2105" }, { "cve": "CVE-2016-2106", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2106" } ], "notes": [ { "category": "general", "text": "Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2106", "url": "https://www.suse.com/security/cve/CVE-2016-2106" }, { "category": "external", "summary": "SUSE Bug 977584 for CVE-2016-2106", "url": "https://bugzilla.suse.com/977584" }, { "category": "external", "summary": "SUSE Bug 977615 for CVE-2016-2106", "url": "https://bugzilla.suse.com/977615" }, { "category": "external", "summary": "SUSE Bug 978492 for CVE-2016-2106", "url": "https://bugzilla.suse.com/978492" }, { "category": "external", "summary": "SUSE Bug 979279 for CVE-2016-2106", "url": "https://bugzilla.suse.com/979279" }, { "category": "external", "summary": "SUSE Bug 990369 for CVE-2016-2106", "url": "https://bugzilla.suse.com/990369" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2106" }, { "cve": "CVE-2016-2107", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2107" } ], "notes": [ { "category": "general", "text": "The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2107", "url": "https://www.suse.com/security/cve/CVE-2016-2107" }, { "category": "external", "summary": "SUSE Bug 976942 for CVE-2016-2107", "url": "https://bugzilla.suse.com/976942" }, { "category": "external", "summary": "SUSE Bug 977584 for CVE-2016-2107", "url": "https://bugzilla.suse.com/977584" }, { "category": "external", "summary": "SUSE Bug 977616 for CVE-2016-2107", "url": "https://bugzilla.suse.com/977616" }, { "category": "external", "summary": "SUSE Bug 978492 for CVE-2016-2107", "url": "https://bugzilla.suse.com/978492" }, { "category": "external", "summary": "SUSE Bug 990369 for CVE-2016-2107", "url": "https://bugzilla.suse.com/990369" }, { "category": "external", "summary": "SUSE Bug 990370 for CVE-2016-2107", "url": "https://bugzilla.suse.com/990370" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-2107" }, { "cve": "CVE-2016-2109", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2109" } ], "notes": [ { "category": "general", "text": "The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2109", "url": "https://www.suse.com/security/cve/CVE-2016-2109" }, { "category": "external", "summary": "SUSE Bug 1015243 for CVE-2016-2109", "url": "https://bugzilla.suse.com/1015243" }, { "category": "external", "summary": "SUSE Bug 976942 for CVE-2016-2109", "url": "https://bugzilla.suse.com/976942" }, { "category": "external", "summary": "SUSE Bug 977584 for CVE-2016-2109", "url": "https://bugzilla.suse.com/977584" }, { "category": "external", "summary": "SUSE Bug 978492 for CVE-2016-2109", "url": "https://bugzilla.suse.com/978492" }, { "category": "external", "summary": "SUSE Bug 990369 for CVE-2016-2109", "url": "https://bugzilla.suse.com/990369" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-2109" }, { "cve": "CVE-2016-2176", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2176" } ], "notes": [ { "category": "general", "text": "The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2176", "url": "https://www.suse.com/security/cve/CVE-2016-2176" }, { "category": "external", "summary": "SUSE Bug 978224 for CVE-2016-2176", "url": "https://bugzilla.suse.com/978224" }, { "category": "external", "summary": "SUSE Bug 990369 for CVE-2016-2176", "url": "https://bugzilla.suse.com/990369" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-2176" }, { "cve": "CVE-2016-2177", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2177" } ], "notes": [ { "category": "general", "text": "OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2177", "url": "https://www.suse.com/security/cve/CVE-2016-2177" }, { "category": "external", "summary": "SUSE Bug 982575 for CVE-2016-2177", "url": "https://bugzilla.suse.com/982575" }, { "category": "external", "summary": "SUSE Bug 999075 for CVE-2016-2177", "url": "https://bugzilla.suse.com/999075" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-2177", "url": "https://bugzilla.suse.com/999665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-2177" }, { "cve": "CVE-2016-2178", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2178" } ], "notes": [ { "category": "general", "text": "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2178", "url": "https://www.suse.com/security/cve/CVE-2016-2178" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-2178", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 983249 for CVE-2016-2178", "url": "https://bugzilla.suse.com/983249" }, { "category": "external", "summary": "SUSE Bug 983519 for CVE-2016-2178", "url": "https://bugzilla.suse.com/983519" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-2178", "url": "https://bugzilla.suse.com/999665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2178" }, { "cve": "CVE-2016-2179", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2179" } ], "notes": [ { "category": "general", "text": "The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2179", "url": "https://www.suse.com/security/cve/CVE-2016-2179" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-2179", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 994844 for CVE-2016-2179", "url": "https://bugzilla.suse.com/994844" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-2179", "url": "https://bugzilla.suse.com/999665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-2179" }, { "cve": "CVE-2016-2180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2180" } ], "notes": [ { "category": "general", "text": "The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the \"openssl ts\" command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2180", "url": "https://www.suse.com/security/cve/CVE-2016-2180" }, { "category": "external", "summary": "SUSE Bug 1003811 for CVE-2016-2180", "url": "https://bugzilla.suse.com/1003811" }, { "category": "external", "summary": "SUSE Bug 990419 for CVE-2016-2180", "url": "https://bugzilla.suse.com/990419" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-2180", "url": "https://bugzilla.suse.com/999665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2180" }, { "cve": "CVE-2016-2181", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2181" } ], "notes": [ { "category": "general", "text": "The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2181", "url": "https://www.suse.com/security/cve/CVE-2016-2181" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-2181", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 994749 for CVE-2016-2181", "url": "https://bugzilla.suse.com/994749" }, { "category": "external", "summary": "SUSE Bug 994844 for CVE-2016-2181", "url": "https://bugzilla.suse.com/994844" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-2181", "url": "https://bugzilla.suse.com/999665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2181" }, { "cve": "CVE-2016-2182", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2182" } ], "notes": [ { "category": "general", "text": "The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2182", "url": "https://www.suse.com/security/cve/CVE-2016-2182" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-2182", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 993819 for CVE-2016-2182", "url": "https://bugzilla.suse.com/993819" }, { "category": "external", "summary": "SUSE Bug 994844 for CVE-2016-2182", "url": "https://bugzilla.suse.com/994844" }, { "category": "external", "summary": "SUSE Bug 995959 for CVE-2016-2182", "url": "https://bugzilla.suse.com/995959" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-2182", "url": "https://bugzilla.suse.com/999665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2182" }, { "cve": "CVE-2016-2183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2183" } ], "notes": [ { "category": "general", "text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2183", "url": "https://www.suse.com/security/cve/CVE-2016-2183" }, { "category": "external", "summary": "SUSE Bug 1001912 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1001912" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1024218" }, { "category": "external", "summary": "SUSE Bug 1027038 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1027038" }, { "category": "external", "summary": "SUSE Bug 1034689 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1034689" }, { "category": "external", "summary": "SUSE Bug 1056614 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1056614" }, { "category": "external", "summary": "SUSE Bug 1171693 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1171693" }, { "category": "external", "summary": "SUSE Bug 994844 for CVE-2016-2183", "url": "https://bugzilla.suse.com/994844" }, { "category": "external", "summary": "SUSE Bug 995359 for CVE-2016-2183", "url": "https://bugzilla.suse.com/995359" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-2183" }, { "cve": "CVE-2016-6302", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6302" } ], "notes": [ { "category": "general", "text": "The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6302", "url": "https://www.suse.com/security/cve/CVE-2016-6302" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-6302", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 994844 for CVE-2016-6302", "url": "https://bugzilla.suse.com/994844" }, { "category": "external", "summary": "SUSE Bug 995324 for CVE-2016-6302", "url": "https://bugzilla.suse.com/995324" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-6302", "url": "https://bugzilla.suse.com/999665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-6302" }, { "cve": "CVE-2016-6303", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6303" } ], "notes": [ { "category": "general", "text": "Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6303", "url": "https://www.suse.com/security/cve/CVE-2016-6303" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-6303", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-6303", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 994844 for CVE-2016-6303", "url": "https://bugzilla.suse.com/994844" }, { "category": "external", "summary": "SUSE Bug 995377 for CVE-2016-6303", "url": "https://bugzilla.suse.com/995377" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-6303", "url": "https://bugzilla.suse.com/999665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-6303" }, { "cve": "CVE-2016-6304", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6304" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6304", "url": "https://www.suse.com/security/cve/CVE-2016-6304" }, { "category": "external", "summary": "SUSE Bug 1001706 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1001706" }, { "category": "external", "summary": "SUSE Bug 1003811 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1003811" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 1005579 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1005579" }, { "category": "external", "summary": "SUSE Bug 1021375 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1021375" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-6304", "url": "https://bugzilla.suse.com/999665" }, { "category": "external", "summary": "SUSE Bug 999666 for CVE-2016-6304", "url": "https://bugzilla.suse.com/999666" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-6304" }, { "cve": "CVE-2016-6306", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6306" } ], "notes": [ { "category": "general", "text": "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6306", "url": "https://www.suse.com/security/cve/CVE-2016-6306" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-6306", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-6306", "url": "https://bugzilla.suse.com/999665" }, { "category": "external", "summary": "SUSE Bug 999668 for CVE-2016-6306", "url": "https://bugzilla.suse.com/999668" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-6306" }, { "cve": "CVE-2016-7052", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7052" } ], "notes": [ { "category": "general", "text": "crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7052", "url": "https://www.suse.com/security/cve/CVE-2016-7052" }, { "category": "external", "summary": "SUSE Bug 1001148 for CVE-2016-7052", "url": "https://bugzilla.suse.com/1001148" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-7052" }, { "cve": "CVE-2016-7055", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7055" } ], "notes": [ { "category": "general", "text": "There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker\u0027s direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients that chose the curve will be affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7055", "url": "https://www.suse.com/security/cve/CVE-2016-7055" }, { "category": "external", "summary": "SUSE Bug 1009528 for CVE-2016-7055", "url": "https://bugzilla.suse.com/1009528" }, { "category": "external", "summary": "SUSE Bug 1021641 for CVE-2016-7055", "url": "https://bugzilla.suse.com/1021641" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-7055" }, { "cve": "CVE-2016-7056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7056" } ], "notes": [ { "category": "general", "text": "A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7056", "url": "https://www.suse.com/security/cve/CVE-2016-7056" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1019334 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1019334" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7056" }, { "cve": "CVE-2017-3731", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3731" } ], "notes": [ { "category": "general", "text": "If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3731", "url": "https://www.suse.com/security/cve/CVE-2017-3731" }, { "category": "external", "summary": "SUSE Bug 1021641 for CVE-2017-3731", "url": "https://bugzilla.suse.com/1021641" }, { "category": "external", "summary": "SUSE Bug 1022085 for CVE-2017-3731", "url": "https://bugzilla.suse.com/1022085" }, { "category": "external", "summary": "SUSE Bug 1064118 for CVE-2017-3731", "url": "https://bugzilla.suse.com/1064118" }, { "category": "external", "summary": "SUSE Bug 1064119 for CVE-2017-3731", "url": "https://bugzilla.suse.com/1064119" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-3731" }, { "cve": "CVE-2017-3732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3732" } ], "notes": [ { "category": "general", "text": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3732", "url": "https://www.suse.com/security/cve/CVE-2017-3732" }, { "category": "external", "summary": "SUSE Bug 1021641 for CVE-2017-3732", "url": "https://bugzilla.suse.com/1021641" }, { "category": "external", "summary": "SUSE Bug 1022086 for CVE-2017-3732", "url": "https://bugzilla.suse.com/1022086" }, { "category": "external", "summary": "SUSE Bug 1049418 for CVE-2017-3732", "url": "https://bugzilla.suse.com/1049418" }, { "category": "external", "summary": "SUSE Bug 1049421 for CVE-2017-3732", "url": "https://bugzilla.suse.com/1049421" }, { "category": "external", "summary": "SUSE Bug 1049422 for CVE-2017-3732", "url": "https://bugzilla.suse.com/1049422" }, { "category": "external", "summary": "SUSE Bug 1066242 for CVE-2017-3732", "url": "https://bugzilla.suse.com/1066242" }, { "category": "external", "summary": "SUSE Bug 1071906 for CVE-2017-3732", "url": "https://bugzilla.suse.com/1071906" }, { "category": "external", "summary": "SUSE Bug 957814 for CVE-2017-3732", "url": "https://bugzilla.suse.com/957814" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-3732" }, { "cve": "CVE-2017-3735", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3735" } ], "notes": [ { "category": "general", "text": "While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3735", "url": "https://www.suse.com/security/cve/CVE-2017-3735" }, { "category": "external", "summary": "SUSE Bug 1056058 for CVE-2017-3735", "url": "https://bugzilla.suse.com/1056058" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-3735" }, { "cve": "CVE-2017-3736", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3736" } ], "notes": [ { "category": "general", "text": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3736", "url": "https://www.suse.com/security/cve/CVE-2017-3736" }, { "category": "external", "summary": "SUSE Bug 1066242 for CVE-2017-3736", "url": "https://bugzilla.suse.com/1066242" }, { "category": "external", "summary": "SUSE Bug 1071906 for CVE-2017-3736", "url": "https://bugzilla.suse.com/1071906" }, { "category": "external", "summary": "SUSE Bug 1076369 for CVE-2017-3736", "url": "https://bugzilla.suse.com/1076369" }, { "category": "external", "summary": "SUSE Bug 957814 for CVE-2017-3736", "url": "https://bugzilla.suse.com/957814" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-3736" }, { "cve": "CVE-2017-3738", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3738" } ], "notes": [ { "category": "general", "text": "There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3738", "url": "https://www.suse.com/security/cve/CVE-2017-3738" }, { "category": "external", "summary": "SUSE Bug 1071906 for CVE-2017-3738", "url": "https://bugzilla.suse.com/1071906" }, { "category": "external", "summary": "SUSE Bug 1097757 for CVE-2017-3738", "url": "https://bugzilla.suse.com/1097757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-3738" }, { "cve": "CVE-2018-0732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0732" } ], "notes": [ { "category": "general", "text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0732", "url": "https://www.suse.com/security/cve/CVE-2018-0732" }, { "category": "external", "summary": "SUSE Bug 1077628 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1077628" }, { "category": "external", "summary": "SUSE Bug 1097158 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1097158" }, { "category": "external", "summary": "SUSE Bug 1099502 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1099502" }, { "category": "external", "summary": "SUSE Bug 1106692 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1106692" }, { "category": "external", "summary": "SUSE Bug 1108542 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1108542" }, { "category": "external", "summary": "SUSE Bug 1110163 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1110163" }, { "category": "external", "summary": "SUSE Bug 1112097 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1112097" }, { "category": "external", "summary": "SUSE Bug 1122198 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1122198" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-0732" }, { "cve": "CVE-2018-0734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0734" } ], "notes": [ { "category": "general", "text": "The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0734", "url": "https://www.suse.com/security/cve/CVE-2018-0734" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1113652 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113652" }, { "category": "external", "summary": "SUSE Bug 1113742 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113742" }, { "category": "external", "summary": "SUSE Bug 1122198 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1122198" }, { "category": "external", "summary": "SUSE Bug 1122212 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1122212" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-0734" }, { "cve": "CVE-2018-0735", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0735" } ], "notes": [ { "category": "general", "text": "The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0735", "url": "https://www.suse.com/security/cve/CVE-2018-0735" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-0735", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1113651 for CVE-2018-0735", "url": "https://bugzilla.suse.com/1113651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-0735" }, { "cve": "CVE-2018-0737", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0737" } ], "notes": [ { "category": "general", "text": "The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0737", "url": "https://www.suse.com/security/cve/CVE-2018-0737" }, { "category": "external", "summary": "SUSE Bug 1089039 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1089039" }, { "category": "external", "summary": "SUSE Bug 1089041 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1089041" }, { "category": "external", "summary": "SUSE Bug 1089044 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1089044" }, { "category": "external", "summary": "SUSE Bug 1089045 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1089045" }, { "category": "external", "summary": "SUSE Bug 1108542 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1108542" }, { "category": "external", "summary": "SUSE Bug 1123780 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1123780" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1126909" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-0737" }, { "cve": "CVE-2018-0739", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0739" } ], "notes": [ { "category": "general", "text": "Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0739", "url": "https://www.suse.com/security/cve/CVE-2018-0739" }, { "category": "external", "summary": "SUSE Bug 1087102 for CVE-2018-0739", "url": "https://bugzilla.suse.com/1087102" }, { "category": "external", "summary": "SUSE Bug 1089997 for CVE-2018-0739", "url": "https://bugzilla.suse.com/1089997" }, { "category": "external", "summary": "SUSE Bug 1094291 for CVE-2018-0739", "url": "https://bugzilla.suse.com/1094291" }, { "category": "external", "summary": "SUSE Bug 1108542 for CVE-2018-0739", "url": "https://bugzilla.suse.com/1108542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-0739" }, { "cve": "CVE-2019-1543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1543" } ], "notes": [ { "category": "general", "text": "ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of this cipher. Any application that relies on the integrity of these ignored leading bytes of a long nonce may be further affected. Any OpenSSL internal use of this cipher, including in SSL/TLS, is safe because no such use sets such a long nonce value. However user applications that use this cipher directly and set a non-default nonce length to be longer than 12 bytes may be vulnerable. OpenSSL versions 1.1.1 and 1.1.0 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1c (Affected 1.1.1-1.1.1b). Fixed in OpenSSL 1.1.0k (Affected 1.1.0-1.1.0j).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1543", "url": "https://www.suse.com/security/cve/CVE-2019-1543" }, { "category": "external", "summary": "SUSE Bug 1128189 for CVE-2019-1543", "url": "https://bugzilla.suse.com/1128189" }, { "category": "external", "summary": "SUSE Bug 1141801 for CVE-2019-1543", "url": "https://bugzilla.suse.com/1141801" }, { "category": "external", "summary": "SUSE Bug 1154162 for CVE-2019-1543", "url": "https://bugzilla.suse.com/1154162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-1543" }, { "cve": "CVE-2019-1547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1547" } ], "notes": [ { "category": "general", "text": "Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1547", "url": "https://www.suse.com/security/cve/CVE-2019-1547" }, { "category": "external", "summary": "SUSE Bug 1150003 for CVE-2019-1547", "url": "https://bugzilla.suse.com/1150003" }, { "category": "external", "summary": "SUSE Bug 1154162 for CVE-2019-1547", "url": "https://bugzilla.suse.com/1154162" }, { "category": "external", "summary": "SUSE Bug 1154166 for CVE-2019-1547", "url": "https://bugzilla.suse.com/1154166" }, { "category": "external", "summary": "SUSE Bug 1156430 for CVE-2019-1547", "url": "https://bugzilla.suse.com/1156430" }, { "category": "external", "summary": "SUSE Bug 1161085 for CVE-2019-1547", "url": "https://bugzilla.suse.com/1161085" }, { "category": "external", "summary": "SUSE Bug 1205621 for CVE-2019-1547", "url": "https://bugzilla.suse.com/1205621" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-1547" }, { "cve": "CVE-2019-1549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1549" } ], "notes": [ { "category": "general", "text": "OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this protection was not being used in the default case. A partial mitigation for this issue is that the output from a high precision timer is mixed into the RNG state so the likelihood of a parent and child process sharing state is significantly reduced. If an application already calls OPENSSL_init_crypto() explicitly using OPENSSL_INIT_ATFORK then this problem does not occur at all. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1549", "url": "https://www.suse.com/security/cve/CVE-2019-1549" }, { "category": "external", "summary": "SUSE Bug 1150247 for CVE-2019-1549", "url": "https://bugzilla.suse.com/1150247" }, { "category": "external", "summary": "SUSE Bug 1154162 for CVE-2019-1549", "url": "https://bugzilla.suse.com/1154162" }, { "category": "external", "summary": "SUSE Bug 1205621 for CVE-2019-1549", "url": "https://bugzilla.suse.com/1205621" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-1549" }, { "cve": "CVE-2019-1551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1551" } ], "notes": [ { "category": "general", "text": "There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1551", "url": "https://www.suse.com/security/cve/CVE-2019-1551" }, { "category": "external", "summary": "SUSE Bug 1158809 for CVE-2019-1551", "url": "https://bugzilla.suse.com/1158809" }, { "category": "external", "summary": "SUSE Bug 1205621 for CVE-2019-1551", "url": "https://bugzilla.suse.com/1205621" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-1551" }, { "cve": "CVE-2019-1563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1563" } ], "notes": [ { "category": "general", "text": "In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1563", "url": "https://www.suse.com/security/cve/CVE-2019-1563" }, { "category": "external", "summary": "SUSE Bug 1150250 for CVE-2019-1563", "url": "https://bugzilla.suse.com/1150250" }, { "category": "external", "summary": "SUSE Bug 1154162 for CVE-2019-1563", "url": "https://bugzilla.suse.com/1154162" }, { "category": "external", "summary": "SUSE Bug 1156430 for CVE-2019-1563", "url": "https://bugzilla.suse.com/1156430" }, { "category": "external", "summary": "SUSE Bug 1205621 for CVE-2019-1563", "url": "https://bugzilla.suse.com/1205621" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-1563" }, { "cve": "CVE-2020-1967", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1967" } ], "notes": [ { "category": "general", "text": "Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the \"signature_algorithms_cert\" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1967", "url": "https://www.suse.com/security/cve/CVE-2020-1967" }, { "category": "external", "summary": "SUSE Bug 1169407 for CVE-2020-1967", "url": "https://bugzilla.suse.com/1169407" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1971" } ], "notes": [ { "category": "general", "text": "The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL\u0027s s_server, s_client and verify tools have support for the \"-crl_download\" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL\u0027s parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1971", "url": "https://www.suse.com/security/cve/CVE-2020-1971" }, { "category": "external", "summary": "SUSE Bug 1179491 for CVE-2020-1971", "url": "https://bugzilla.suse.com/1179491" }, { "category": "external", "summary": "SUSE Bug 1196179 for CVE-2020-1971", "url": "https://bugzilla.suse.com/1196179" }, { "category": "external", "summary": "SUSE Bug 1199303 for CVE-2020-1971", "url": "https://bugzilla.suse.com/1199303" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-1971" }, { "cve": "CVE-2021-23840", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23840" } ], "notes": [ { "category": "general", "text": "Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23840", "url": "https://www.suse.com/security/cve/CVE-2021-23840" }, { "category": "external", "summary": "SUSE Bug 1182333 for CVE-2021-23840", "url": "https://bugzilla.suse.com/1182333" }, { "category": "external", "summary": "SUSE Bug 1187743 for CVE-2021-23840", "url": "https://bugzilla.suse.com/1187743" }, { "category": "external", "summary": "SUSE Bug 1214334 for CVE-2021-23840", "url": "https://bugzilla.suse.com/1214334" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-23840", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23841" } ], "notes": [ { "category": "general", "text": "The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23841", "url": "https://www.suse.com/security/cve/CVE-2021-23841" }, { "category": "external", "summary": "SUSE Bug 1182331 for CVE-2021-23841", "url": "https://bugzilla.suse.com/1182331" }, { "category": "external", "summary": "SUSE Bug 1187743 for CVE-2021-23841", "url": "https://bugzilla.suse.com/1187743" }, { "category": "external", "summary": "SUSE Bug 1214334 for CVE-2021-23841", "url": "https://bugzilla.suse.com/1214334" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-23841" }, { "cve": "CVE-2021-3449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3449" } ], "notes": [ { "category": "general", "text": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3449", "url": "https://www.suse.com/security/cve/CVE-2021-3449" }, { "category": "external", "summary": "SUSE Bug 1183852 for CVE-2021-3449", "url": "https://bugzilla.suse.com/1183852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3450" } ], "notes": [ { "category": "general", "text": "The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a \"purpose\" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named \"purpose\" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3450", "url": "https://www.suse.com/security/cve/CVE-2021-3450" }, { "category": "external", "summary": "SUSE Bug 1183851 for CVE-2021-3450", "url": "https://bugzilla.suse.com/1183851" }, { "category": "external", "summary": "SUSE Bug 1188549 for CVE-2021-3450", "url": "https://bugzilla.suse.com/1188549" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3450", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3711" } ], "notes": [ { "category": "general", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3711", "url": "https://www.suse.com/security/cve/CVE-2021-3711" }, { "category": "external", "summary": "SUSE Bug 1189520 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1189520" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1205663 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1205663" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3711", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3712" } ], "notes": [ { "category": "general", "text": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3712", "url": "https://www.suse.com/security/cve/CVE-2021-3712" }, { "category": "external", "summary": "SUSE Bug 1189521 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1189521" }, { "category": "external", "summary": "SUSE Bug 1190129 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1190129" }, { "category": "external", "summary": "SUSE Bug 1191640 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1191640" }, { "category": "external", "summary": "SUSE Bug 1192100 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1192100" }, { "category": "external", "summary": "SUSE Bug 1192787 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1192787" }, { "category": "external", "summary": "SUSE Bug 1194948 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1194948" }, { "category": "external", "summary": "SUSE Bug 1225628 for CVE-2021-3712", "url": "https://bugzilla.suse.com/1225628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl-1_1-devel-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-32bit-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:libopenssl1_1-hmac-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-1.1.1l-1.2.x86_64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.aarch64", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.ppc64le", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.s390x", "openSUSE Tumbleweed:openssl-1_1-doc-1.1.1l-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3712" } ] }
rhsa-2021:4618
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.4.0 General\nAvailability release images, which fix several bugs and security issues.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.4.0 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with security policy built in.\n\nThis advisory contains the container images for Red Hat Advanced Cluster\nManagement for Kubernetes, which fix several bugs and security issues. See\nthe following Release Notes documentation, which will be updated shortly\nfor this release, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana\ngement_for_kubernetes/2.4/html/release_notes/\n\nSecurity fixes: \n\n* CVE-2021-33623: nodejs-trim-newlines: ReDoS in .end() method\n\n* CVE-2021-32626: redis: Lua scripts can overflow the heap-based Lua stack\n\n* CVE-2021-32627: redis: Integer overflow issue with Streams\n\n* CVE-2021-32628: redis: Integer overflow bug in the ziplist data structure\n\n* CVE-2021-32672: redis: Out of bounds read in lua debugger protocol parser\n\n* CVE-2021-32675: redis: Denial of service via Redis Standard Protocol (RESP) request\n\n* CVE-2021-32687: redis: Integer overflow issue with intsets\n\n* CVE-2021-32690: helm: information disclosure vulnerability\n\n* CVE-2021-32803: nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite\n\n* CVE-2021-32804: nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite\n\n* CVE-2021-23017: nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name\n\n* CVE-2021-3711: openssl: SM2 Decryption Buffer Overflow\n\n* CVE-2021-3712: openssl: Read buffer overruns processing ASN.1 strings\n\n* CVE-2021-3749: nodejs-axios: Regular expression denial of service in trim function\n\n* CVE-2021-41099: redis: Integer overflow issue with strings\n\nBug fixes:\n\n* RFE ACM Application management UI doesn\u0027t reflect object status (Bugzilla #1965321)\n\n* RHACM 2.4 files (Bugzilla #1983663)\n\n* Hive Operator CrashLoopBackOff when deploying ACM with latest downstream 2.4 (Bugzilla #1993366)\n\n* submariner-addon pod failing in RHACM 2.4 latest ds snapshot (Bugzilla #1994668)\n\n* ACM 2.4 install on OCP 4.9 ipv6 disconnected hub fails due to multicluster pod in clb (Bugzilla #2000274)\n\n* pre-network-manager-config failed due to timeout when static config is used (Bugzilla #2003915)\n\n* InfraEnv condition does not reflect the actual error message (Bugzilla #2009204, 2010030)\n\n* Flaky test point to a nil pointer conditions list (Bugzilla #2010175)\n\n* InfraEnv status shows \u0027Failed to create image: internal error (Bugzilla #2010272)\n\n* subctl diagnose firewall intra-cluster - failed VXLAN checks (Bugzilla #2013157)\n\n* pre-network-manager-config failed due to timeout when static config is used (Bugzilla #2014084)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4618", "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1963121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1963121" }, { "category": "external", "summary": "1965321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965321" }, { "category": "external", "summary": "1966615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966615" }, { "category": "external", "summary": "1978144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978144" }, { "category": "external", "summary": "1983663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983663" }, { "category": "external", "summary": "1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "1994668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994668" }, { "category": "external", "summary": "1995623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995623" }, { "category": "external", "summary": "1995634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634" }, { "category": "external", "summary": "1999784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784" }, { "category": "external", "summary": "2000274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000274" }, { "category": "external", "summary": "2003915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003915" }, { "category": "external", "summary": "2009204", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009204" }, { "category": "external", "summary": "2010030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010030" }, { "category": "external", "summary": "2010175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010175" }, { "category": "external", "summary": "2010272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010272" }, { "category": "external", "summary": "2010991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010991" }, { "category": "external", "summary": "2011000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011000" }, { "category": "external", "summary": "2011001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011001" }, { "category": "external", "summary": "2011004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011004" }, { "category": "external", "summary": "2011010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011010" }, { "category": "external", "summary": "2011017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011017" }, { "category": "external", "summary": "2011020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011020" }, { "category": "external", "summary": "2013157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013157" }, { "category": "external", "summary": "1993366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993366" }, { "category": "external", "summary": "2014084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014084" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4618.json" } ], "title": "Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4 images and security updates", "tracking": { "current_release_date": "2025-08-05T15:08:54+00:00", "generator": { "date": "2025-08-05T15:08:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:4618", "initial_release_date": "2021-11-11T18:31:07+00:00", "revision_history": [ { "date": "2021-11-11T18:31:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-11T18:31:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-05T15:08:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.4::el8" } } } ], "category": "product_family", "name": "Red Hat ACM" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "product_id": "rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "product": { "name": "rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "product_id": "rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.0-164" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "product": { "name": "rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "product_id": "rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "product": { "name": "rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "product_id": "rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-image-service-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "product": { "name": "rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "product_id": "rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "product": { "name": "rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "product_id": "rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.0-53" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "product_id": "rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "product_id": "rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.0-47" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "product": { "name": "rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "product_id": "rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "product_id": "rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.0-17" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "product": { "name": "rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "product_id": "rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-operator-bundle\u0026tag=v2.4.0-168" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "product_id": "rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "product": { "name": "rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "product_id": "rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "product_id": "rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.0-19" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.0-48" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "product_id": "rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "product": { "name": "rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "product_id": "rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "product_id": "rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "product": { "name": "rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "product_id": "rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "product": { "name": "rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "product_id": "rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "product": { "name": "rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "product_id": "rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "product_id": "rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "product": { "name": "rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "product_id": "rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "product": { "name": "rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "product_id": "rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-agent-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "product": { "name": "rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "product_id": "rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "product": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "product_id": "rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-reporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "product_id": "rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "product": { "name": "rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "product_id": "rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "product": { "name": "rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "product_id": "rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.0-14" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "product": { "name": "rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "product_id": "rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "product": { "name": "rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "product_id": "rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.0-20" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "product_id": "rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.0-33" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "product": { "name": "rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "product_id": "rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "product": { "name": "rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "product_id": "rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "product": { "name": "rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "product_id": "rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.0-8" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "product_id": "rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "product": { "name": "rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "product_id": "rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.0-164" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "product": { "name": "rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "product_id": "rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "product": { "name": "rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "product_id": "rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-image-service-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "product": { "name": "rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "product_id": "rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "product": { "name": "rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "product_id": "rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.0-53" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "product_id": "rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "product_id": "rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.0-47" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "product": { "name": "rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "product_id": "rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "product_id": "rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.0-17" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "product_id": "rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "product": { "name": "rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "product_id": "rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "product_id": "rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.0-19" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.0-48" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "product_id": "rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "product_id": "rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "product_id": "rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "product": { "name": "rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "product_id": "rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "product": { "name": "rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "product_id": "rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "product": { "name": "rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "product_id": "rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "product_id": "rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "product": { "name": "rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "product_id": "rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "product": { "name": "rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "product_id": "rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "product": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "product_id": "rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-reporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "product_id": "rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "product": { "name": "rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "product_id": "rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "product": { "name": "rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "product_id": "rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.0-14" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "product": { "name": "rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "product_id": "rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "product": { "name": "rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "product_id": "rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.0-20" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "product_id": "rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.0-33" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "product": { "name": "rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "product_id": "rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "product": { "name": "rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "product_id": "rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "product": { "name": "rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "product_id": "rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.0-8" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "product_id": "rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "product": { "name": "rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "product_id": "rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.0-164" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "product": { "name": "rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "product_id": "rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "product": { "name": "rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "product_id": "rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "product": { "name": "rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "product_id": "rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.0-53" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "product_id": "rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "product_id": "rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.0-47" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "product": { "name": "rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "product_id": "rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "product_id": "rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.0-17" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "product_id": "rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "product": { "name": "rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "product_id": "rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "product_id": "rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.0-19" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.0-48" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "product_id": "rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "product": { "name": "rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "product_id": "rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "product_id": "rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "product": { "name": "rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "product_id": "rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "product": { "name": "rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "product_id": "rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "product": { "name": "rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "product_id": "rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "product_id": "rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "product": { "name": "rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "product_id": "rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "product_id": "rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "product": { "name": "rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "product_id": "rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "product": { "name": "rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "product_id": "rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.0-14" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "product": { "name": "rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "product_id": "rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "product": { "name": "rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "product_id": "rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.0-20" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "product_id": "rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.0-33" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "product": { "name": "rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "product_id": "rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "product": { "name": "rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "product_id": "rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x", "product": { "name": "rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x", "product_id": "rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.0-8" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64" }, "product_reference": "rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le" }, "product_reference": "rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64" }, "product_reference": "rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64" }, "product_reference": "rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le" }, "product_reference": "rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le" }, "product_reference": "rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64" }, "product_reference": "rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x" }, "product_reference": "rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64" }, "product_reference": "rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le" }, "product_reference": "rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le" }, "product_reference": "rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x" }, "product_reference": "rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64" }, "product_reference": "rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64" }, "product_reference": "rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x" }, "product_reference": "rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64" }, "product_reference": "rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le" }, "product_reference": "rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x" }, "product_reference": "rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64" }, "product_reference": "rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le" }, "product_reference": "rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le" }, "product_reference": "rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x" }, "product_reference": "rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64" }, "product_reference": "rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x" }, "product_reference": "rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le" }, "product_reference": "rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64" }, "product_reference": "rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64" }, "product_reference": "rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x" }, "product_reference": "rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le" }, "product_reference": "rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le" }, "product_reference": "rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x" }, "product_reference": "rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64" }, "product_reference": "rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x" }, "product_reference": "rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64" }, "product_reference": "rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le" }, "product_reference": "rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le" }, "product_reference": "rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64" }, "product_reference": "rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" }, "product_reference": "rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ], "organization": "John Ouyang", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-3711", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-08-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995623" } ], "notes": [ { "category": "description", "text": "A flaw was found in openssl. A miscalculation of a buffer size was found in openssl\u0027s SM2 decryption function, allowing up to 62 arbitrary bytes to be written outside of the buffer. A remote attacker could use this flaw to crash an application supporting SM2 signature or encryption algorithm, or, possibly, execute arbitrary code with the permissions of the user running that application. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SM2 Decryption Buffer Overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenSSL packages shipped with Red Hat Enterprise Linux 8 are not compiled with support for SM2 algorithm and therefore are not affected by this flaw. Packages shipped with Red Hat Enterprise Linux 7 and older do not support the SM2 algorithm. \n\nThe Red Hat Advanced Cluster Management for Kubernetes 2.3.1 and the previous versions are using the vulnerable version of the OpenSSL library, however the vulnerable code path is not reachable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3711" }, { "category": "external", "summary": "RHBZ#1995623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3711", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3711" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3711", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3711" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210824.txt", "url": "https://www.openssl.org/news/secadv/20210824.txt" } ], "release_date": "2021-08-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: SM2 Decryption Buffer Overflow" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ], "organization": "Ingo Schwarze", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-08-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995634" } ], "notes": [ { "category": "description", "text": "It was found that openssl assumed ASN.1 strings to be NUL terminated. A malicious actor may be able to force an application into calling openssl function with a specially crafted, non-NUL terminated string to deliberately hit this bug, which may result in a crash of the application, causing a Denial of Service attack, or possibly, memory disclosure. The highest threat from this vulnerability is to data confidentiality and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Read buffer overruns processing ASN.1 strings", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do not ship the affected OpenSSL component but rely on the Red Hat Enterprise Linux to consume them:\n * Red Hat Satellite\n * Red Hat Update Infrastructure\n * Red Hat CloudForms\n\nThe Red Hat Advanced Cluster Management for Kubernetes is using the vulnerable version of the library, however the vulnerable code path is not reachable.\n\ncompat-openssl10 is deprecated and has been removed from RHEL 9 and later. No further patches would be available for this component except on a case by case basis.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3712" }, { "category": "external", "summary": "RHBZ#1995634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210824.txt", "url": "https://www.openssl.org/news/secadv/20210824.txt" } ], "release_date": "2021-08-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "Customers should make an attempt to run current binaries/architectures and not rely on compatibility layers to run older binaries/architectures. In case older binaries/architectures are needed, sandboxing should be used to address such problems and guard the bug.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Read buffer overruns processing ASN.1 strings" }, { "cve": "CVE-2021-3749", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999784" } ], "notes": [ { "category": "description", "text": "A Regular Expression Denial of Service (ReDoS) vulnerability was found in the nodejs axios. This flaw allows an attacker to provide crafted input to the trim function, which might cause high resources consumption and as a consequence lead to denial of service. The highest threat from this vulnerability is system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-axios: Regular expression denial of service in trim function", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift Container Platform (OCP) grafana-container does package a vulnerable version of nodejs axios. However, due to the instance being read only and behind OpenShift OAuth, the impact of this vulnerability is Low.\n\n* Red Hat Advanced Cluster Management for Kubernetes (RHACM) 2.1 and previous versions does contain a vulnerable version of nodejs axios, RHACM 2.2 on towards are not affected versions. For RHACM 2.1, due to the instance being read only and behind OAuth, the impact of this vulnerability is Low.\n\n* Because Service Telemetry Framework 1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF\u0027s service-telemetry-operator-container and smart-gateway-operator-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3749" }, { "category": "external", "summary": "RHBZ#1999784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3749", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749" }, { "category": "external", "summary": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929", "url": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929" }, { "category": "external", "summary": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31", "url": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31" } ], "release_date": "2021-08-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-axios: Regular expression denial of service in trim function" }, { "cve": "CVE-2021-23017", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2021-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1963121" } ], "notes": [ { "category": "description", "text": "A flaw was found in nginx. An off-by-one error while processing DNS responses allows a network attacker to write a dot character out of bounds in a heap allocated buffer which can allow overwriting the least significant byte of next heap chunk metadata likely leading to a remote code execution in certain circumstances. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23017" }, { "category": "external", "summary": "RHBZ#1963121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1963121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23017", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23017" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23017", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23017" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name" }, { "acknowledgments": [ { "names": [ "Meir Shpilraien" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-32626", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011017" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow was found in redis. Specially crafted Lua scripts executing in Redis cause the heap-based Lua stack to overflow due to incomplete checks for this condition. This flaw allows a remote attacker to corrupt the heap and potentially trigger remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Lua scripts can overflow the heap-based Lua stack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32626" }, { "category": "external", "summary": "RHBZ#2011017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011017" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32626", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32626" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32626", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32626" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c", "url": "https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "Prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. Please see https://redis.io/topics/acl for more information on how to do this.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Lua scripts can overflow the heap-based Lua stack" }, { "acknowledgments": [ { "names": [ "sundb" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-32627", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011010" } ], "notes": [ { "category": "description", "text": "An integer overflow issue was found in redis. The vulnerability involves changing the default \"proto-max-bulk-len\" and \"client-query-buffer-limit\" configuration parameters to very large values and constructing specially crafted large stream elements. This flaw allows a remote attacker to corrupt the heap and potentially trigger remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Integer overflow issue with Streams", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32627" }, { "category": "external", "summary": "RHBZ#2011010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32627", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32627" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32627", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32627" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v", "url": "https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "The flaw can be mitigated by disallowing usage of the CONFIG SET command via ACL configuration. This will prevent clients from setting the `proto-max-bulk-len` configuration parameter. Please see https://redis.io/topics/acl for more information on how to do this.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Integer overflow issue with Streams" }, { "acknowledgments": [ { "names": [ "sundb" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-32628", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011004" } ], "notes": [ { "category": "description", "text": "An integer overflow issue was found in the redis ziplist data structure. The vulnerability involves modifying the default ziplist configuration parameters (hash-max-ziplist-entries, hash-max-ziplist-value, zset-max-ziplist-entries or zset-max-ziplist-value) to a very large value, and then constructing specially crafted commands to create very large ziplists. This flaw allows a remote attacker to corrupt the heap and potentially trigger remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Integer overflow bug in the ziplist data structure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32628" }, { "category": "external", "summary": "RHBZ#2011004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011004" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32628", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32628" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32628", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32628" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr", "url": "https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "The flaw can be mitigated by disallowing usage of the CONFIG SET command via ACL configuration. This will prevent clients from setting the above configuration parameters. Please see https://redis.io/topics/acl for more information on how to do this.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Integer overflow bug in the ziplist data structure" }, { "acknowledgments": [ { "names": [ "Meir Shpilraien" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-32672", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011001" } ], "notes": [ { "category": "description", "text": "A flaw was found in redis. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger\u2019s protocol parser to read data beyond the actual buffer, potentially leading to an information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Out of bounds read in lua debugger protocol parser", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32672" }, { "category": "external", "summary": "RHBZ#2011001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32672", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32672" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm", "url": "https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "redis: Out of bounds read in lua debugger protocol parser" }, { "cve": "CVE-2021-32675", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011000" } ], "notes": [ { "category": "description", "text": "A flaw was found in redis. When parsing an incoming Redis Standard Protocol (RESP) request, redis allocates memory according to user-specified values, which determine the number of elements (in the multi-bulk header) and size of each element (in the bulk header). This flaw allows an unauthenticated, remote user delivering specially crafted requests over multiple connections to cause the server to allocate a significant amount of memory, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Denial of service via Redis Standard Protocol (RESP) request", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32675" }, { "category": "external", "summary": "RHBZ#2011000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011000" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32675", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32675" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p", "url": "https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "Prevent unauthenticated users from connecting to Redis by using network access control tools (e.g., firewalls) or enabling TLS and requiring users to authenticate using client side certificates.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Denial of service via Redis Standard Protocol (RESP) request" }, { "acknowledgments": [ { "names": [ "Pawel Wieczorkiewicz" ], "organization": "Amazon Web Services", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-32687", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2010991" } ], "notes": [ { "category": "description", "text": "An integer overflow issue was found in redis. The vulnerability involves changing the default \"set-max-intset-entries\" configuration parameter to a very large value and constructing specially crafted commands to manipulate sets. This flaw allows a remote attacker to leak arbitrary contents of the heap or potentially trigger remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Integer overflow issue with intsets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32687" }, { "category": "external", "summary": "RHBZ#2010991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32687", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32687" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32687", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32687" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q", "url": "https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "The flaw can be mitigated by disallowing usage of the CONFIG SET command via ACL configuration. This will prevent clients from setting the `set-max-intset-entries` configuration parameter. Please see https://redis.io/topics/acl for more information on how to do this.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Integer overflow issue with intsets" }, { "cve": "CVE-2021-32690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1978144" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in Helm, which could allow credentials associated with one Helm repository to be leaked to another repository referenced by the first one. In order to exploit this vulnerability, an attacker would need to control a repository trusted by the configuration of the target Helm instance.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm: information disclosure vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Advanced Cluster Management for Kubernetes:\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are using helm chart provided by the installer, so components are not using untrusted charts except in the application-lifecycle area. For this reason we marked the impact as low. For RHACM, the credentials could be leaked only when a helm chart is stored in a domain other than the helm repository itself. In practice, this rarely happens as the chart is stored in the same helm repository. For example, this chart in the helm repo https://charts.helm.sh/stable/index.yaml references only charts stored in the same domain (charts.heml.sh). From version, 2.2 onwards, multicloud-operators-placementrule and multicloud-operators-deployable do not use helm at all.\n\nOpenShift Developer Tools and Services:\n\nThe OpenShift Helm team has analyzed this CVE and we have come to the conclusion that this only affects OpenShift Helm customers that use the CLI to install and update charts. It does not affect customers that use the OpenShift Console to install and update charts. To mitigate this issue, customers can refresh their Helm cli by following the Red Had official Helm install guide here: https://docs.openshift.com/container-platform/4.7/cli_reference/helm_cli/getting-started-with-helm-on-openshift-container-platform.html#installing-helm_getting-started-with-helm-on-openshift. The mirror (https://mirror.openshift.com/pub/openshift-v4/clients/helm/latest/) have already been updated with helm 3.6.2 which contains the fix for this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32690" }, { "category": "external", "summary": "RHBZ#1978144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978144" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32690" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf", "url": "https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf" } ], "release_date": "2021-06-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "helm: information disclosure vulnerability" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990415" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "RHBZ#1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32803", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990409" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. A specially crafted node module could create and overwrite files outside of its dedicated directory.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "RHBZ#1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-33623", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966615" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-trim-newlines. Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-trim-newlines: ReDoS in .end() method", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) grafana-container does package a vulnerable verison of nodejs trim-newlines. However due to the instance being read only and behind OpenShift OAuth, the impact by this vulnerability is Low. Red Hat Advanced Cluster Management for Kubernetes (ACM) containers affected by this flaw are only accessible to authenticated users, thus the impact of this vulnerability is Low. \nRed Hat Virtualization (RHV) does package a vulnerable version of nodejs-trim-newlines. However, no untrusted content is being parsed therefore the impact of this vulnerability is Low.\n\nThe hosted services are shipped with the vulnerable packages, however the vulnerable methods were not identified in use at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33623" }, { "category": "external", "summary": "RHBZ#1966615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33623", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33623" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33623", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33623" } ], "release_date": "2021-05-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-trim-newlines: ReDoS in .end() method" }, { "acknowledgments": [ { "names": [ "yiyuaner" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-41099", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011020" } ], "notes": [ { "category": "description", "text": "An integer overflow issue was found in redis in the underlying string library. The vulnerability involves changing the default \"proto-max-bulk-len\" configuration parameter to a very large value and constructing specially crafted network payloads or commands. This flaw allows a remote attacker to corrupt the heap and potentially trigger remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Integer overflow issue with strings", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-41099" }, { "category": "external", "summary": "RHBZ#2011020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-41099", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41099" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41099", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41099" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph", "url": "https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "The flaw can be mitigated by disallowing usage of the CONFIG SET command via ACL configuration. This will prevent clients from setting the `proto-max-bulk-len` configuration parameter. Please see https://redis.io/topics/acl for more information on how to do this.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Integer overflow issue with strings" } ] }
fkie_cve-2021-3711
Vulnerability from fkie_nvd
▶ | URL | Tags | |
---|---|---|---|
openssl-security@openssl.org | http://www.openwall.com/lists/oss-security/2021/08/26/2 | Mailing List, Third Party Advisory | |
openssl-security@openssl.org | https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Third Party Advisory | |
openssl-security@openssl.org | https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46 | ||
openssl-security@openssl.org | https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E | ||
openssl-security@openssl.org | https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E | ||
openssl-security@openssl.org | https://security.gentoo.org/glsa/202209-02 | Third Party Advisory | |
openssl-security@openssl.org | https://security.gentoo.org/glsa/202210-02 | Third Party Advisory | |
openssl-security@openssl.org | https://security.netapp.com/advisory/ntap-20210827-0010/ | Third Party Advisory | |
openssl-security@openssl.org | https://security.netapp.com/advisory/ntap-20211022-0003/ | Third Party Advisory | |
openssl-security@openssl.org | https://security.netapp.com/advisory/ntap-20240621-0006/ | ||
openssl-security@openssl.org | https://www.debian.org/security/2021/dsa-4963 | Third Party Advisory | |
openssl-security@openssl.org | https://www.openssl.org/news/secadv/20210824.txt | Vendor Advisory | |
openssl-security@openssl.org | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory | |
openssl-security@openssl.org | https://www.oracle.com/security-alerts/cpujan2022.html | Patch, Third Party Advisory | |
openssl-security@openssl.org | https://www.oracle.com/security-alerts/cpuoct2021.html | Patch, Third Party Advisory | |
openssl-security@openssl.org | https://www.tenable.com/security/tns-2021-16 | Third Party Advisory | |
openssl-security@openssl.org | https://www.tenable.com/security/tns-2022-02 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/08/26/2 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202209-02 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202210-02 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210827-0010/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20211022-0003/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20240621-0006/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4963 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.openssl.org/news/secadv/20210824.txt | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2022.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujan2022.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuoct2021.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/tns-2021-16 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/tns-2022-02 | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
openssl | openssl | * | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 | |
netapp | active_iq_unified_manager | - | |
netapp | active_iq_unified_manager | - | |
netapp | clustered_data_ontap | - | |
netapp | clustered_data_ontap_antivirus_connector | - | |
netapp | e-series_santricity_os_controller | * | |
netapp | hci_management_node | - | |
netapp | manageability_software_development_kit | - | |
netapp | oncommand_insight | - | |
netapp | oncommand_workflow_automation | - | |
netapp | santricity_smi-s_provider | - | |
netapp | snapcenter | - | |
netapp | solidfire | - | |
netapp | storage_encryption | - | |
oracle | communications_cloud_native_core_security_edge_protection_proxy | 1.7.0 | |
oracle | communications_cloud_native_core_unified_data_repository | 1.15.0 | |
oracle | communications_session_border_controller | 8.4 | |
oracle | communications_session_border_controller | 9.0 | |
oracle | communications_unified_session_manager | 8.2.5 | |
oracle | communications_unified_session_manager | 8.4.5 | |
oracle | enterprise_communications_broker | 3.2.0 | |
oracle | enterprise_communications_broker | 3.3.0 | |
oracle | enterprise_session_border_controller | 8.4 | |
oracle | enterprise_session_border_controller | 9.0 | |
oracle | essbase | * | |
oracle | essbase | * | |
oracle | health_sciences_inform_publisher | 6.2.1.1 | |
oracle | health_sciences_inform_publisher | 6.3.1.1 | |
oracle | jd_edwards_enterpriseone_tools | * | |
oracle | jd_edwards_world_security | a9.4 | |
oracle | mysql_connectors | * | |
oracle | mysql_enterprise_monitor | * | |
oracle | mysql_server | * | |
oracle | mysql_server | * | |
oracle | peoplesoft_enterprise_peopletools | 8.57 | |
oracle | peoplesoft_enterprise_peopletools | 8.58 | |
oracle | peoplesoft_enterprise_peopletools | 8.59 | |
oracle | zfs_storage_appliance_kit | 8.8 | |
tenable | nessus_network_monitor | * | |
tenable | tenable.sc | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9592A08-7FF0-490F-B684-6EA8E49F36C7", "versionEndExcluding": "1.1.1l", "versionStartIncluding": "1.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FE996B1-6951-4F85-AA58-B99A379D2163", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*", "matchCriteriaId": "62347994-1353-497C-9C4A-D5D8D95F67E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "433D435D-13D0-4EAA-ACD9-DD88DA712D00", "versionEndIncluding": "11.50.2", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3C19813-E823-456A-B1CE-EC0684CE1953", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:manageability_software_development_kit:-:*:*:*:*:*:*:*", "matchCriteriaId": "D39DCAE7-494F-40B2-867F-6C6A077939DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*", "matchCriteriaId": "361B791A-D336-4431-8F68-8135BEFFAEA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:storage_encryption:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D82795C-F1ED-4D2C-B578-75B9EECBB99C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "BD4349FE-EEF8-489A-8ABF-5FCD55EC6DE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6EAA723-2A23-4151-930B-86ACF9CC1C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*", "matchCriteriaId": "9C416FD3-2E2F-4BBC-BD5F-F896825883F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_session_border_controller:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "D886339E-EDB2-4879-BD54-1800E4CA9CAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_unified_session_manager:8.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FB468FEE-A0F4-49A0-BBEE-10D0733C87D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_unified_session_manager:8.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "CC5C177E-0C77-48C9-847A-A9E5AA7DBC1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_communications_broker:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "348EEE70-E114-4720-AAAF-E77DE5C9A2D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_communications_broker:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "3DCDD73B-57B1-4580-B922-5662E3AC13B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_session_border_controller:8.4:*:*:*:*:*:*:*", "matchCriteriaId": "7015A8CB-8FA6-423E-8307-BD903244F517", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_session_border_controller:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9A4E206-56C7-4578-AC9C-088B0C8D9CFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:essbase:*:*:*:*:*:*:*:*", "matchCriteriaId": "C78A7E07-AB08-46C5-942D-B40BBE0C0D06", "versionEndExcluding": "11.1.2.4.47", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:essbase:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2A9C248-94B0-4F7B-AD9C-4BE55AA1E3F2", "versionEndExcluding": "21.3", "versionStartIncluding": "21.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:health_sciences_inform_publisher:6.2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "2F12453B-0E7B-46B9-ADEC-0AC5EDC41058", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:health_sciences_inform_publisher:6.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5D105A5B-0AA8-4782-B804-CB1384F85884", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE34D4F7-5C18-4578-8D0A-722FDF931333", "versionEndExcluding": "9.2.6.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*", "matchCriteriaId": "0B1CAD50-749F-4ADB-A046-BF3585677A58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE23C7E1-F849-411D-850F-A504D4BA3414", "versionEndIncluding": "8.0.27", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*", "matchCriteriaId": "88627B99-16DC-4878-A63A-A40F6FC1F477", "versionEndIncluding": "8.0.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "E667933A-37EA-4BC2-9180-C3B4B7038866", "versionEndIncluding": "5.7.35", "versionStartIncluding": "5.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "709E83B4-8C66-4255-870B-2F72B37BA8C6", "versionEndIncluding": "8.0.26", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*", "matchCriteriaId": "7E1E416B-920B-49A0-9523-382898C2979D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*", "matchCriteriaId": "D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*", "matchCriteriaId": "C8AF00C6-B97F-414D-A8DF-057E6BFD8597", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D3E503FB-6279-4D4A-91D8-E237ECF9D2B0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tenable:nessus_network_monitor:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FD1ED11-84AA-47E6-AD00-E08D035AF53B", "versionEndIncluding": "5.13.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D977244-DC29-4301-8D89-0BD01BC328B8", "versionEndIncluding": "5.19.1", "versionStartIncluding": "5.16.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k)." }, { "lang": "es", "value": "Para descifrar los datos cifrados de SM2 se espera que una aplicaci\u00f3n llame a la funci\u00f3n de la API EVP_PKEY_decrypt(). Normalmente, una aplicaci\u00f3n llamar\u00e1 a esta funci\u00f3n dos veces. La primera vez, al entrar, el par\u00e1metro \"out\" puede ser NULL y, al salir, el par\u00e1metro \"outlen\" se rellena con el tama\u00f1o del b\u00fafer necesario para contener el texto plano descifrado. La aplicaci\u00f3n puede entonces asignar un b\u00fafer de tama\u00f1o suficiente y llamar de nuevo a EVP_PKEY_decrypt(), pero esta vez pasando un valor no NULL para el par\u00e1metro \"out\". Un bug en la implementaci\u00f3n del c\u00f3digo de descifrado SM2 significa que el c\u00e1lculo del tama\u00f1o del b\u00fafer necesario para mantener el texto plano devuelto por la primera llamada a EVP_PKEY_decrypt() puede ser menor que el tama\u00f1o real requerido por la segunda llamada. Esto puede conllevar a un desbordamiento del b\u00fafer cuando la aplicaci\u00f3n llama a EVP_PKEY_decrypt() por segunda vez con un b\u00fafer demasiado peque\u00f1o. Un atacante malicioso que sea capaz de presentar el contenido de SM2 para su descifrado a una aplicaci\u00f3n podr\u00eda causar que los datos elegidos por el atacante desborden el b\u00fafer hasta un m\u00e1ximo de 62 bytes alterando el contenido de otros datos mantenidos despu\u00e9s del b\u00fafer, posiblemente cambiando el comportamiento de la aplicaci\u00f3n o causando el bloqueo de la misma. La ubicaci\u00f3n del b\u00fafer depende de la aplicaci\u00f3n, pero normalmente se asigna a la pila. Corregido en OpenSSL versi\u00f3n 1.1.1l (Afectada 1.1.1-1.1.1k)." } ], "id": "CVE-2021-3711", "lastModified": "2024-11-21T06:22:12.960", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-24T15:15:09.133", "references": [ { "source": "openssl-security@openssl.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "source": "openssl-security@openssl.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "source": "openssl-security@openssl.org", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "source": "openssl-security@openssl.org", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E" }, { "source": "openssl-security@openssl.org", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E" }, { "source": "openssl-security@openssl.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-02" }, { "source": "openssl-security@openssl.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-02" }, { "source": "openssl-security@openssl.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "source": "openssl-security@openssl.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "source": "openssl-security@openssl.org", "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" }, { "source": "openssl-security@openssl.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4963" }, { "source": "openssl-security@openssl.org", "tags": [ "Vendor Advisory" ], "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "source": "openssl-security@openssl.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "openssl-security@openssl.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "openssl-security@openssl.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "openssl-security@openssl.org", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2021-16" }, { "source": "openssl-security@openssl.org", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2022-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4963" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2021-16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2022-02" } ], "sourceIdentifier": "openssl-security@openssl.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2021-3711
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2021-3711", "description": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "id": "GSD-2021-3711", "references": [ "https://www.suse.com/security/cve/CVE-2021-3711.html", "https://www.debian.org/security/2021/dsa-4963", "https://access.redhat.com/errata/RHSA-2021:4618", "https://ubuntu.com/security/CVE-2021-3711", "https://advisories.mageia.org/CVE-2021-3711.html", "https://security.archlinux.org/CVE-2021-3711" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-3711" ], "details": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "id": "GSD-2021-3711", "modified": "2023-12-13T01:23:33.992248Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "openssl-security@openssl.org", "DATE_PUBLIC": "2021-08-24", "ID": "CVE-2021-3711", "STATE": "PUBLIC", "TITLE": "SM2 Decryption Buffer Overflow" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OpenSSL", "version": { "version_data": [ { "version_value": "Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k)" } ] } } ] }, "vendor_name": "OpenSSL" } ] } }, "credit": [ { "lang": "eng", "value": "John Ouyang" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k)." } ] }, "impact": [ { "lang": "eng", "url": "https://www.openssl.org/policies/secpolicy.html#High", "value": "High" } ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.openssl.org/news/secadv/20210824.txt", "refsource": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46", "refsource": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "name": "DSA-4963", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "name": "[tomcat-dev] 20210825 OpenSSL security announcement - do we need a Tomcat Native release?", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "name": "[oss-security] 20210825 OpenSSL SM2 Decryption Buffer Overflow (CVE-2021-3711), Read buffer overruns processing ASN.1 strings (CVE-2021-3712)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "name": "[tomcat-dev] 20210826 Re: OpenSSL security announcement - do we need a Tomcat Native release?", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "name": "https://security.netapp.com/advisory/ntap-20210827-0010/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "name": "https://www.tenable.com/security/tns-2021-16", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "name": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "name": "https://security.netapp.com/advisory/ntap-20211022-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "name": "https://www.tenable.com/security/tns-2022-02", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2022-02" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "name": "GLSA-202209-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202209-02" }, { "name": "GLSA-202210-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202210-02" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=1.1.1 \u003c1.1.1l", "affected_versions": "All versions starting from 1.1.1 before 1.1.1l", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-120", "CWE-937" ], "date": "2022-12-06", "description": "In order to decrypt SM2 encrypted data an application is expected to call the API function `EVP_PKEY_decrypt()`. Typically an application will call this function twice. The first time, on entry, the `out` parameter can be NULL and, on exit, the `outlen` parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call `EVP_PKEY_decrypt()` again, but this time passing a non-NULL value for the `out` parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to `EVP_PKEY_decrypt()` can be smaller than the actual size required by the second call. This can lead to a buffer overflow when `EVP_PKEY_decrypt()` is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated.", "fixed_versions": [ "1.1.1o" ], "identifier": "CVE-2021-3711", "identifiers": [ "CVE-2021-3711" ], "not_impacted": "All versions before 1.1.1, all versions starting from 1.1.1l", "package_slug": "conan/openssl", "pubdate": "2021-08-24", "solution": "Upgrade to version 1.1.1o or above.", "title": "Buffer Overflow", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-3711", "https://www.openssl.org/news/secadv/20210824.txt" ], "uuid": "3e68c929-e3a0-4145-945b-333d52dbb38e" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.1.1l", "versionStartIncluding": "1.1.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:manageability_software_development_kit:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:storage_encryption:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.50.2", "versionStartIncluding": "11.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:enterprise_session_border_controller:8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:enterprise_communications_broker:3.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.0.26", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:enterprise_session_border_controller:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_session_border_controller:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.7.35", "versionStartIncluding": "5.7.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.0.25", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:enterprise_communications_broker:3.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:essbase:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.1.2.4.47", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.0.27", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:essbase:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.3", "versionStartIncluding": "21.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_unified_session_manager:8.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:health_sciences_inform_publisher:6.3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:health_sciences_inform_publisher:6.2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "9.2.6.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_unified_session_manager:8.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.19.1", "versionStartIncluding": "5.16.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tenable:nessus_network_monitor:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.13.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "openssl-security@openssl.org", "ID": "CVE-2021-3711" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-120" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.openssl.org/news/secadv/20210824.txt", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "name": "DSA-4963", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4963" }, { "name": "[tomcat-dev] 20210825 OpenSSL security announcement - do we need a Tomcat Native release?", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "name": "[oss-security] 20210825 OpenSSL SM2 Decryption Buffer Overflow (CVE-2021-3711), Read buffer overruns processing ASN.1 strings (CVE-2021-3712)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "name": "[tomcat-dev] 20210826 Re: OpenSSL security announcement - do we need a Tomcat Native release?", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "name": "https://security.netapp.com/advisory/ntap-20210827-0010/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "name": "https://www.tenable.com/security/tns-2021-16", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2021-16" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "name": "https://security.netapp.com/advisory/ntap-20211022-0003/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "name": "https://www.tenable.com/security/tns-2022-02", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2022-02" }, { "name": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "GLSA-202209-02", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-02" }, { "name": "GLSA-202210-02", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-02" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2022-12-06T21:23Z", "publishedDate": "2021-08-24T15:15Z" } } }
ghsa-5ww6-px42-wc85
Vulnerability from github
In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).
{ "affected": [ { "package": { "ecosystem": "crates.io", "name": "openssl-src" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "111.16.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2021-3711" ], "database_specific": { "cwe_ids": [ "CWE-120" ], "github_reviewed": true, "github_reviewed_at": "2022-06-17T00:06:51Z", "nvd_published_at": "2021-08-24T15:15:00Z", "severity": "CRITICAL" }, "details": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "id": "GHSA-5ww6-px42-wc85", "modified": "2024-06-24T21:22:25Z", "published": "2022-05-24T19:12:03Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3711" }, { "type": "WEB", "url": "https://www.tenable.com/security/tns-2022-02" }, { "type": "WEB", "url": "https://www.tenable.com/security/tns-2021-16" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "type": "WEB", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "type": "WEB", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20240621-0006" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20211022-0003" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20210827-0010" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202210-02" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202209-02" }, { "type": "WEB", "url": "https://rustsec.org/advisories/RUSTSEC-2021-0097.html" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "type": "WEB", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "SM2 Decryption Buffer Overflow" }
sca-2022-0011
Vulnerability from csaf_sick
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en-US", "notes": [ { "category": "summary", "text": "SICK received a report about multiple vulnerabilities in the SICK Package Analytics. The vulnerabilities result from the used MySQL database with version 5.7.25. The vulnerable MySQL version include Buffer-Overflow, Improper Access Control, and Improper Certification Validation vulnerabilities. \n\nSICK has released a new version of the SICK Package Analytics and recommends updating to the newest version." }, { "category": "general", "text": "As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.", "title": "General Security Measures" }, { "category": "general", "text": "SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer\u2019s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.", "title": "Vulnerability Classification" } ], "publisher": { "category": "vendor", "contact_details": "psirt@sick.de", "issuing_authority": "SICK PSIRT is responsible for any vulnerabilities related to SICK products.", "name": "SICK PSIRT", "namespace": "https://www.sick.com/psirt" }, "references": [ { "summary": "SICK PSIRT Security Advisories", "url": "https://sick.com/psirt" }, { "summary": "SICK Operating Guidelines", "url": "https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf" }, { "summary": "ICS-CERT recommended practices on Industrial Security", "url": "http://ics-cert.us-cert.gov/content/recommended-practices" }, { "summary": "CVSS v3.1 Calculator", "url": "https://www.first.org/cvss/calculator/3.1" }, { "category": "self", "summary": "The canonical URL.", "url": "https://www.sick.com/.well-known/csaf/white/2022/sca-2022-0011.json" } ], "title": "Vulnerabilities in SICK Package Analytics", "tracking": { "current_release_date": "2022-06-08T15:00:00.000Z", "generator": { "date": "2023-02-10T09:52:49.725Z", "engine": { "name": "Secvisogram", "version": "2.0.0" } }, "id": "SCA-2022-0011", "initial_release_date": "2022-06-08T15:00:00.000Z", "revision_history": [ { "date": "2022-06-08T15:00:00.000Z", "number": "1", "summary": "Initial Release" }, { "date": "2023-02-10T11:00:00.000Z", "number": "2", "summary": "Updated Advisory (only visual changes)" }, { "date": "2025-07-30T07:29:45.000Z", "number": "3", "summary": "Updated Advisory: URL for SICK Operating Guidelines has been updated" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c4.4", "product": { "name": "SICK Package Analytics \u003c4.4", "product_id": "CSAFPID-0001", "product_identification_helper": { "x_generic_uris": [ { "namespace": "SICK:Website", "uri": "SICK:Website:https://www.sick.com/de/de/p/p600146" } ] } } } ], "category": "product_name", "name": "Package Analytics" } ], "category": "vendor", "name": "SICK AG" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3711", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "description", "text": "A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behavior, or causing the application to crash." } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "date": "2022-06-08T15:00:00.000Z", "details": "The patch and installation procedure for the software update is available from the responsible SICK customer contact person.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-35604", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "description", "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data." } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "date": "2022-06-01T15:00:00.000Z", "details": "The patch and installation procedure for the software update is available from the responsible SICK customer contact person.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-22926", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "description", "text": "When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name. If the application runs with a current working directory that is writable by other users (like `/tmp`), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake." } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "The patch and installation procedure for the software update is available from the responsible SICK customer contact person.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] } ] }
ssa-028723
Vulnerability from csaf_siemens
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Siemens BFCClient contains multiple vulnerabilities in the integrated OpenSSL component that could allow an attacker to read memory contents, to change the application behaviour or to create a denial of service condition.\n\nSiemens has released a new version for BFCClient and recommends to update to the latest version.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-028723: Multiple OpenSSL Vulnerabilities in BFCClient Before V2.17 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-028723.html" }, { "category": "self", "summary": "SSA-028723: Multiple OpenSSL Vulnerabilities in BFCClient Before V2.17 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-028723.json" } ], "title": "SSA-028723: Multiple OpenSSL Vulnerabilities in BFCClient Before V2.17", "tracking": { "current_release_date": "2025-08-13T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-028723", "initial_release_date": "2025-08-12T00:00:00Z", "revision_history": [ { "date": "2025-08-12T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2025-08-13T00:00:00Z", "legacy_version": "1.1", "number": "2", "summary": "Updated acknowledgments for CVE-2023-0286" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:intdot/\u003c2.17", "product": { "name": "BFCClient", "product_id": "1" } } ], "category": "product_name", "name": "BFCClient" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3711", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.17 or later version. Contact customer support to obtain the update", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.17 or later version. Contact customer support to obtain the update", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-3712" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The BN_mod_sqrt() function in openSSL, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.17 or later version. Contact customer support to obtain the update", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-0778" }, { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Disable CRL (certification revocation list) checking, if possible", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update to V2.17 or later version. Contact customer support to obtain the update", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0464", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing the `-policy` argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()` function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.17 or later version. Contact customer support to obtain the update", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-0464" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.